DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Kim, Yongdae | - |
dc.contributor.advisor | 김용대 | - |
dc.contributor.author | Choi, John | - |
dc.date.accessioned | 2022-04-27T19:30:58Z | - |
dc.date.available | 2022-04-27T19:30:58Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=948990&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/295941 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2021.2,[iii, 21 p. :] | - |
dc.description.abstract | Rowhammer is an attack that repeatedly reads a row in a specific area and causes electrical errors to flip bits in adjacent rows that can cause data modification, system memory corruption, or even privilege escalation. As NAND flash memory used in data centers has massive personal information, rowhammer attack on NAND flash can be critical. Recently, IBM researchers have presented that a rowhammer attack on a NAND flash SSD can trigger privilege escalation. However, they demonstrated only a part of the entire attack process. Therefore, it is necessary to consider the overall attack process and in-depth research on the NAND rowhammer attack. In this paper, we show the feasibility of end-to-end row hammer attack on NAND flash. We propose an end-to-end rowhammer attack in the emerging storage system and challenges that attack must overcome. The target system is composed of Open Channel SSD, which discloses the internal structure to the host and SPDK, which allows users to directly manage the data in the device. Error modeling and bit flip mode, which defines how bits flip, are designed to conduct rowhammer attack using QEMU emulator. We analyze the possibility of rowhammer attack with bit flip mode, write/erase cycle, page count, and the state of the victim block. As a result, the attack succeeds when the write/erase cycle was 10,000 or more, and attack success rate is higher when sequential bit flips occur. Based on this analysis, we present a practical rowhammer attack method in which an attacker can access victim data without any authorities. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | Rowhammer▼aNAND flash▼aOpen Channel SSD▼aSDPK▼aSecurity | - |
dc.subject | 로우해머▼a낸드 플래시▼a오픈 채널 SSD▼aSPDK▼a보안 | - |
dc.title | Crash the flash: an end-to-end rowhammer attack on an NAND flash system | - |
dc.title.alternative | 낸드플래시의 전기적 특성을 이용한 로우해머 공격에 대한 연구 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :전기및전자공학부, | - |
dc.contributor.alternativeauthor | 최요한 | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.