Throwhammer: Rowhammer Attacks over the Network and Defenses.
Andrei TatarRadhesh Krishnan KonothElias AthanasopoulosCristiano GiuffridaHerbert BosKaveh RazaviPublished in: USENIX Annual Technical Conference (2018)
Keyphrases
- denial of service attacks
- traffic analysis
- dos attacks
- denial of service
- network security
- network model
- network anomaly detection
- network attacks
- complex networks
- security threats
- peer to peer
- ddos attacks
- network traffic
- network management
- computer networks
- wireless sensor networks
- network intrusion
- network architecture
- lightweight
- network intrusion detection
- social network analysis
- communication networks
- digital images
- malicious attacks
- machine learning
- data mining
- neural network