Study of Row Hammer attack
The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security rese...
Saved in:
Main Authors: | Wenwei WANG, Peishun LIU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018007 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Rethinking the Producer-Consumer Relationship in Modern DRAM-Based Systems
by: Minesh Patel, et al.
Published: (2024-01-01) -
Cache timing attack on SMS4
by: ZHAO Xin-jie, et al.
Published: (2010-01-01) -
Learning-based page replacement scheme for efficient I/O processing
by: Hwajung Kim
Published: (2025-02-01) -
An Investigation of the Row and its Place in Persian Lyric Poems of Ghaleb Dehlavi
by: Seyed Abrar Hosseini, et al.
Published: (2021-12-01) -
Improved Cache trace driven attack on AES and CLEFIA
by: ZHAO Xin-jie1, et al.
Published: (2011-01-01)