From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks.
Anil KurmusNikolas IoannouNikolaos PapandreouThomas P. ParnellPublished in: WOOT (2017)
Keyphrases
- data corruption
- countermeasures
- chosen plaintext
- attack detection
- malicious users
- malicious attacks
- differential power analysis
- cyber attacks
- denial of service attacks
- ddos attacks
- power analysis
- dos attacks
- security policies
- attack scenarios
- security risks
- injection attacks
- operating system
- denial of service
- fault injection
- network intrusion
- block cipher
- normal traffic
- network intrusions
- network attacks
- detecting malicious
- information leakage
- buffer overflow
- attack graphs
- computer systems
- feature vectors
- defense mechanisms
- phishing attacks
- security vulnerabilities
- network intrusion detection
- security measures
- desktop search
- information security
- anomaly detection
- attack graph