Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress

  • Loïc France
  • , Maria Mushtaq
  • , Florent Bruguier
  • , David Novo
  • , Pascal Benoit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Modern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Multiple mitigation techniques have been proposed to counter this issue, but they all come at a non-negligible cost of performance and/or silicon surface. Some techniques rely on a detection mechanism using row access counters to trigger automatic defenses. In this paper, we propose a tool to build a system-specific detection mechanism using gem5 to simulate the system and Machine Learning to detect the attack by analyzing hardware event traces. The detection mechanism built with our tool shows high accuracy (over 99.5%) and low latency (maximum 474μs to classify when running offline in software) to detect an attack before completion.

Original languageEnglish
Title of host publicationSAT-CPS 2021 - Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
PublisherAssociation for Computing Machinery, Inc
Pages104-109
Number of pages6
ISBN (Electronic)9781450383196
DOIs
Publication statusPublished - 28 Apr 2021
Externally publishedYes
Event1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, SaT-CPS 2021 - Virtual, Online, United States
Duration: 28 Apr 2021 → …

Publication series

NameSAT-CPS 2021 - Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems

Conference

Conference1st ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, SaT-CPS 2021
Country/TerritoryUnited States
CityVirtual, Online
Period28/04/21 → …

Keywords

  • computer architecture
  • deep learning
  • dram
  • gem5
  • machine-learning
  • neural networks
  • rowhammer
  • rowhammer detection
  • security
  • security assessments

Fingerprint

Dive into the research topics of 'Vulnerability Assessment of the Rowhammer Attack Using Machine Learning and the gem5 Simulator - Work in Progress'. Together they form a unique fingerprint.

Cite this