论文标题

SOK:商品操作系统上的行锤

SoK: Rowhammer on Commodity Operating Systems

论文作者

Zhang, Zhi, Chen, Decheng, Qi, Jiahao, Cheng, Yueqiang, Jiang, Shijie, Lin, Yiyang, Gao, Yansong, Nepal, Surya, Zou, Yi, Zhang, Jiliang, Xiang, Yang

论文摘要

在过去的几年中,Rowhammer引起了学术界和工业的关注,因为Rowhammer剥削对系统安全造成了严重的后果。自2014年首次对Rowhammer进行了首次全面研究以来,已经证明了许多Rowhammer攻击基于动态的随机访问记忆(DRAM)商品系统,以破坏软件的机密性,完整性和可用性。因此,已经提出了许多软件防御措施来减轻对遗产(例如DDR3)或最近DRAM(例如DDR4)的商品系统攻击。此外,该行业的多个硬件防御(例如,目标行刷新)已被部署到最近的DRAM中,以消除Rowhammer,我们将其归类为生产防御。 在本文中,我们将Rowhammer攻击和防御系统系统化,重点是基于DRAM的商品系统。特别是,我们已经建立了一个统一的框架,展示了绳锤攻击如何影响商品系统。通过框架,我们表征了现有的攻击,阐明了尚未探索的新攻击向量。我们进一步利用该框架对软件和生产防御,概括其关键防御策略并总结其关键局限性,并从中确定潜在的防御策略。

Rowhammer has drawn much attention from both academia and industry in the past years as rowhammer exploitation poses severe consequences to system security. Since the first comprehensive study of rowhammer in 2014, a number of rowhammer attacks have been demonstrated against dynamic random access memory (DRAM)-based commodity systems to break software confidentiality, integrity and availability. Accordingly, numerous software defenses have been proposed to mitigate rowhammer attacks on commodity systems of either legacy (e.g., DDR3) or recent DRAM (e.g., DDR4). Besides, multiple hardware defenses (e.g., Target Row Refresh) from the industry have been deployed into recent DRAM to eliminate rowhammer, which we categorize as production defenses. In this paper, we systematize rowhammer attacks and defenses with a focus on DRAM-based commodity systems. Particularly, we have established a unified framework demonstrating how a rowhammer attack affects a commodity system. With the framework, we characterize existing attacks, shedding light on new attack vectors that have not yet been explored. We further leverage the framework to categorize software and production defenses, generalize their key defense strategies and summarize their key limitations, from which potential defense strategies are identified.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源