Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator -Work in Progress - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2021

Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator -Work in Progress

(1) , (2) , (1) , (3, 1) , (1)
1
2
3
Loïc France
  • Fonction : Auteur
  • PersonId : 1095783
Maria Mushtaq
Florent Bruguier
David Novo
Pascal Benoit

Résumé

Modern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Multiple mitigation techniques have been proposed to counter this issue, but they all come at a non-negligible cost of performance and/or silicon surface. Some techniques rely on a detection mechanism using row access counters to trigger automatic defenses. In this paper, we propose a tool to build a system-specific detection mechanism using gem5 to simulate the system and Machine Learning to detect the attack by analyzing hardware event traces. The detection mechanism built with our tool shows high accuracy (over 99.8%) and low latency (maximum 264µs to classify when running offline in software) to detect an attack before completion.
Fichier principal
Vignette du fichier
ACM_RH_mitigation(2).pdf (495.96 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03196090 , version 1 (12-04-2021)

Identifiants

Citer

Loïc France, Maria Mushtaq, Florent Bruguier, David Novo, Pascal Benoit. Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator -Work in Progress. SaT-CPS 2021 - ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Apr 2021, Virtually, United States. pp.104-109, ⟨10.1145/3445969.3450425⟩. ⟨hal-03196090⟩
156 Consultations
352 Téléchargements

Altmetric

Partager

Gmail Facebook Twitter LinkedIn More