Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (1): 69-75.doi: 10.11959/j.issn.2096-109x.2018007

• Papers • Previous Articles    

Study of Row Hammer attack

Wenwei WANG,Peishun LIU()   

  1. College of Information Science and Engineering,Ocean University of China,Qingdao 266100,China
  • Revised:2018-01-03 Online:2018-01-01 Published:2018-02-09
  • Supported by:
    The National Key R&D Plan Program of China(2017YFC0806200)


The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.

Key words: Row Hammer, privilege escalation, DRAM, cache eviction, page table spraying, memory waylaying

CLC Number: 

No Suggested Reading articles found!