dc.contributor.advisor | Rahman, Rafeed | |
dc.contributor.author | Sobhan, Mahfuz | |
dc.contributor.author | Pranti, Khandker Samia Rahman | |
dc.contributor.author | Siddique, Bashir | |
dc.date.accessioned | 2025-02-13T09:41:33Z | |
dc.date.available | 2025-02-13T09:41:33Z | |
dc.date.copyright | 2024 | |
dc.date.issued | 2024-10 | |
dc.identifier.other | ID 20101270 | |
dc.identifier.other | ID 21101103 | |
dc.identifier.other | ID 20101269 | |
dc.identifier.uri | http://hdl.handle.net/10361/25397 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 30-33). | |
dc.description.abstract | Rowhammer is a widely known computer hardware vulnerability in recent years
which breaks the fundamental limitations of DRAM technology by repeatedly accessing
in order to cause bitflips in the adjacent rows. Understanding and analyzing
the effect of Rowhammer in various architectures is a primary need for enhancing
system security and mitigating potential risks against RowHammer. This paper
presents the development of a novel library for reverse engineering DRAM address
functions, enabling efficient mapping and analysis of physical memory addresses
across diverse DRAM architectures. The library accelerates the much-needed extraction
of address-mapping functions, which is a pivotal part for the determination
of the Rowhammer vulnerability in diverse architectures. We integrate the extracted
address mappings with the Blacksmith fuzzer, a state-of-the-art Rowhammer testing
tool, and deploy it on our targeted machines with three distinct architectures. Our
experiments analyze and compare the Rowhammer effects across these platforms,
evaluating metrics such as activation interval, refresh rates, bit flip distribution,
and the potential for reliable exploitation. The results reveal architecture-specific
characteristics of Rowhammer susceptibility and highlight the effectiveness of the
proposed library in automating and streamlining DRAM address function extraction.
Our findings offer interesting insights into the variations in Rowhammer susceptibility
across architectures which contributes to the ongoing efforts of designing
resilient systems and develop standardized testing methodologies for hardware vulnerabilities. | en_US |
dc.description.statementofresponsibility | Mahfuz Sobhan | |
dc.description.statementofresponsibility | Khandker Samia Rahman Pranti | |
dc.description.statementofresponsibility | Bashir Siddique | |
dc.format.extent | 33 pages | |
dc.language.iso | en | en_US |
dc.publisher | BRAC University | en_US |
dc.rights | BRAC University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Rowhammer | en_US |
dc.subject | Bitflips | en_US |
dc.subject | Blacksmith | en_US |
dc.subject | DRAM | en_US |
dc.subject | Address mapping | en_US |
dc.subject.lcsh | Reverse engineering. | |
dc.title | Reverse engineering Intel DRAM addressing and reproduction of blacksmith | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, BRAC University | |
dc.description.degree | B.Sc. in Computer Science | |