Crash the flash: an end-to-end rowhammer attack on an NAND flash system낸드플래시의 전기적 특성을 이용한 로우해머 공격에 대한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 134
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Yongdae-
dc.contributor.advisor김용대-
dc.contributor.authorChoi, John-
dc.date.accessioned2022-04-27T19:30:58Z-
dc.date.available2022-04-27T19:30:58Z-
dc.date.issued2021-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=948990&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/295941-
dc.description학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2021.2,[iii, 21 p. :]-
dc.description.abstractRowhammer is an attack that repeatedly reads a row in a specific area and causes electrical errors to flip bits in adjacent rows that can cause data modification, system memory corruption, or even privilege escalation. As NAND flash memory used in data centers has massive personal information, rowhammer attack on NAND flash can be critical. Recently, IBM researchers have presented that a rowhammer attack on a NAND flash SSD can trigger privilege escalation. However, they demonstrated only a part of the entire attack process. Therefore, it is necessary to consider the overall attack process and in-depth research on the NAND rowhammer attack. In this paper, we show the feasibility of end-to-end row hammer attack on NAND flash. We propose an end-to-end rowhammer attack in the emerging storage system and challenges that attack must overcome. The target system is composed of Open Channel SSD, which discloses the internal structure to the host and SPDK, which allows users to directly manage the data in the device. Error modeling and bit flip mode, which defines how bits flip, are designed to conduct rowhammer attack using QEMU emulator. We analyze the possibility of rowhammer attack with bit flip mode, write/erase cycle, page count, and the state of the victim block. As a result, the attack succeeds when the write/erase cycle was 10,000 or more, and attack success rate is higher when sequential bit flips occur. Based on this analysis, we present a practical rowhammer attack method in which an attacker can access victim data without any authorities.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectRowhammer▼aNAND flash▼aOpen Channel SSD▼aSDPK▼aSecurity-
dc.subject로우해머▼a낸드 플래시▼a오픈 채널 SSD▼aSPDK▼a보안-
dc.titleCrash the flash: an end-to-end rowhammer attack on an NAND flash system-
dc.title.alternative낸드플래시의 전기적 특성을 이용한 로우해머 공격에 대한 연구-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :전기및전자공학부,-
dc.contributor.alternativeauthor최요한-
Appears in Collection
EE-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0