Are we susceptible to rowhammer? an end-to-end methodology for cloud providers
- Conference Paper
Cloud providers are concerned that Rowhammer poses a potentially critical threat to their servers, yet today they lack a systematic way to test whether the DRAM used in their servers is vulnerable to Rowhammer attacks. This paper presents an endto-end methodology to determine if cloud servers are susceptible to these attacks. With our methodology, a cloud provider can construct worst-case testing conditions for DRAM.We apply our methodology to three classes of servers from a major cloud provider. Our findings show that none of the CPU instruction sequences used in prior work to mount Rowhammer attacks create worst-case DRAM testing conditions. To address this limitation, we develop an instruction sequence that leverages microarchitectural side-effects to "hammer"DRAM at a near-optimal rate on modern Intel Skylake and Cascade Lake platforms. We also design a DDR4 fault injector that can reverse engineer row adjacency for any DDR4 DIMM. When applied to our cloud provider's DIMMs, we find that DRAM rows do not always follow a linear map. © 2020 IEEE. Show more
Book title2020 IEEE Symposium on Security and Privacy (SP)
Pages / Article No.
Organisational unit09483 - Mutlu, Onur / Mutlu, Onur
NotesDue to the Coronavirus (COVID-19) the conference was conducted virtually.
MoreShow all metadata