Cache Attacks and Rowhammer on ARM

Research output: ThesisMaster's ThesisResearch

Abstract

In the last years, mobile devices have become the most important personal computing platforms and, thus, it is especially important to protect sensitive information that is stored and processed on these devices. In this thesis, we discuss the applicability of cache attacks and the rowhammer bug on mobile devices. As these attacks have been considered infeasible on ARM-based devices, we demonstrate how to solve key challenges to mount the most powerful cache attacks Prime+Probe, Flush+Reload, Evict+Reload and Flush+Flush and how to induce bit flips. We show the power of these attacks by implementing a high-performance covert-channel, spying on user input and attacking cryptographic algorithms. Finally, we discuss possible countermeasures.
Original languageEnglish
Supervisors/Advisors
  • Gruß, Daniel, Supervisor
Publication statusPublished - 2016

Keywords

  • side-channel attacks
  • cache attacks
  • rowhammer
  • mobile platforms
  • arm
  • prime+probe
  • flush+reload
  • evict+reload
  • flush+flush
  • Cross-CPU attack

Fingerprint Dive into the research topics of 'Cache Attacks and Rowhammer on ARM'. Together they form a unique fingerprint.

  • Cite this