Exploring the Effects of Memory Vulnerabilities Across the Computer Architecture Stack
dc.contributor.author | Tobah, Youssef | |
dc.date.accessioned | 2025-05-12T17:40:22Z | |
dc.date.available | 2025-05-12T17:40:22Z | |
dc.date.issued | 2025 | |
dc.date.submitted | 2025 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/197269 | |
dc.description.abstract | In the pursuit of more performant, power- and area-efficient systems, computers have been exposed to a plethora of security risks and vulnerabilities at various levels of the computer architecture stack. Oftentimes, the effects of a vulnerability at one level propagates into other levels, making it challenging to build defenses that encompass all the effects of a particular exploit. One such vulnerability, known as Rowhammer, allows attackers to flip bits in memory without ever accessing them by rapidly accessing adjacent addresses. Since its discovery, researchers have shown how bit-flips in memory can propagate through a victim's machine to form the basis for numerous exploits, including leaking cryptographic keys, denial of service, and privilege escalation. This thesis explores Rowhammer at various levels of the computer architecture stack. Rowhammer attacks typically require an understanding of multiple components of the stack, including memory, architecture, and operating systems, in addition to other potential systems depending on the target. This thesis contributes to knowledge in the space at multiple levels, further demonstrating the threat Rowhammer poses beyond prior work. More specifically, this thesis presents techniques for reverse-engineering a memory controller's address mapping, how Rowhammer can be combined with microarchitectural exploits, the threat Rowhammer poses to particular software patterns, and lastly, an exploration of the efficiency of end-to-end Rowhammer attacks. By studying Rowhammer as a systems problem involving multiple layers of the computer architecture stack, the goal of this thesis is to demonstrate the need for defenses that solve the Rowhammer issue at its root. More specifically, my goal is to motivate and inform defenses that prevent bit flips from occurring or propagating through the victim machine, rather than continuing to build defenses that patch specific exploits or points of vulnerability. By rooting out bit flips at their source, computers can be made more secure against Rowhammer regardless of what new variety of bit-flip-based exploits attackers are able to craft in the future. | |
dc.language.iso | en_US | |
dc.subject | Rowhammer | |
dc.subject | security | |
dc.title | Exploring the Effects of Memory Vulnerabilities Across the Computer Architecture Stack | |
dc.type | Thesis | |
dc.description.thesisdegreename | PhD | |
dc.description.thesisdegreediscipline | Computer Science & Engineering | |
dc.description.thesisdegreegrantor | University of Michigan, Horace H. Rackham School of Graduate Studies | |
dc.contributor.committeemember | Shin, Kang Geun | |
dc.contributor.committeemember | Chen, Jiasi | |
dc.contributor.committeemember | Austin, Todd M | |
dc.contributor.committeemember | Halderman, J Alex | |
dc.subject.hlbsecondlevel | Computer Science | |
dc.subject.hlbtoplevel | Engineering | |
dc.contributor.affiliationumcampus | Ann Arbor | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/197269/1/ytobah_1.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/25695 | |
dc.identifier.orcid | 0009-0009-6987-8851 | |
dc.identifier.name-orcid | Tobah, Youssef; 0009-0009-6987-8851 | en_US |
dc.working.doi | 10.7302/25695 | en |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.