Show simple item record

Exploring the Effects of Memory Vulnerabilities Across the Computer Architecture Stack

dc.contributor.authorTobah, Youssef
dc.date.accessioned2025-05-12T17:40:22Z
dc.date.available2025-05-12T17:40:22Z
dc.date.issued2025
dc.date.submitted2025
dc.identifier.urihttps://hdl.handle.net/2027.42/197269
dc.description.abstractIn the pursuit of more performant, power- and area-efficient systems, computers have been exposed to a plethora of security risks and vulnerabilities at various levels of the computer architecture stack. Oftentimes, the effects of a vulnerability at one level propagates into other levels, making it challenging to build defenses that encompass all the effects of a particular exploit. One such vulnerability, known as Rowhammer, allows attackers to flip bits in memory without ever accessing them by rapidly accessing adjacent addresses. Since its discovery, researchers have shown how bit-flips in memory can propagate through a victim's machine to form the basis for numerous exploits, including leaking cryptographic keys, denial of service, and privilege escalation. This thesis explores Rowhammer at various levels of the computer architecture stack. Rowhammer attacks typically require an understanding of multiple components of the stack, including memory, architecture, and operating systems, in addition to other potential systems depending on the target. This thesis contributes to knowledge in the space at multiple levels, further demonstrating the threat Rowhammer poses beyond prior work. More specifically, this thesis presents techniques for reverse-engineering a memory controller's address mapping, how Rowhammer can be combined with microarchitectural exploits, the threat Rowhammer poses to particular software patterns, and lastly, an exploration of the efficiency of end-to-end Rowhammer attacks. By studying Rowhammer as a systems problem involving multiple layers of the computer architecture stack, the goal of this thesis is to demonstrate the need for defenses that solve the Rowhammer issue at its root. More specifically, my goal is to motivate and inform defenses that prevent bit flips from occurring or propagating through the victim machine, rather than continuing to build defenses that patch specific exploits or points of vulnerability. By rooting out bit flips at their source, computers can be made more secure against Rowhammer regardless of what new variety of bit-flip-based exploits attackers are able to craft in the future.
dc.language.isoen_US
dc.subjectRowhammer
dc.subjectsecurity
dc.titleExploring the Effects of Memory Vulnerabilities Across the Computer Architecture Stack
dc.typeThesis
dc.description.thesisdegreenamePhD
dc.description.thesisdegreedisciplineComputer Science & Engineering
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.contributor.committeememberShin, Kang Geun
dc.contributor.committeememberChen, Jiasi
dc.contributor.committeememberAustin, Todd M
dc.contributor.committeememberHalderman, J Alex
dc.subject.hlbsecondlevelComputer Science
dc.subject.hlbtoplevelEngineering
dc.contributor.affiliationumcampusAnn Arbor
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/197269/1/ytobah_1.pdf
dc.identifier.doihttps://dx.doi.org/10.7302/25695
dc.identifier.orcid0009-0009-6987-8851
dc.identifier.name-orcidTobah, Youssef; 0009-0009-6987-8851en_US
dc.working.doi10.7302/25695en
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.