Show simple item record

dc.contributor.advisorRahman, Rafeed
dc.contributor.authorSobhan, Mahfuz
dc.contributor.authorPranti, Khandker Samia Rahman
dc.contributor.authorSiddique, Bashir
dc.date.accessioned2025-02-13T09:41:33Z
dc.date.available2025-02-13T09:41:33Z
dc.date.copyright2024
dc.date.issued2024-10
dc.identifier.otherID 20101270
dc.identifier.otherID 21101103
dc.identifier.otherID 20101269
dc.identifier.urihttp://hdl.handle.net/10361/25397
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2024.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 30-33).
dc.description.abstractRowhammer is a widely known computer hardware vulnerability in recent years which breaks the fundamental limitations of DRAM technology by repeatedly accessing in order to cause bitflips in the adjacent rows. Understanding and analyzing the effect of Rowhammer in various architectures is a primary need for enhancing system security and mitigating potential risks against RowHammer. This paper presents the development of a novel library for reverse engineering DRAM address functions, enabling efficient mapping and analysis of physical memory addresses across diverse DRAM architectures. The library accelerates the much-needed extraction of address-mapping functions, which is a pivotal part for the determination of the Rowhammer vulnerability in diverse architectures. We integrate the extracted address mappings with the Blacksmith fuzzer, a state-of-the-art Rowhammer testing tool, and deploy it on our targeted machines with three distinct architectures. Our experiments analyze and compare the Rowhammer effects across these platforms, evaluating metrics such as activation interval, refresh rates, bit flip distribution, and the potential for reliable exploitation. The results reveal architecture-specific characteristics of Rowhammer susceptibility and highlight the effectiveness of the proposed library in automating and streamlining DRAM address function extraction. Our findings offer interesting insights into the variations in Rowhammer susceptibility across architectures which contributes to the ongoing efforts of designing resilient systems and develop standardized testing methodologies for hardware vulnerabilities.en_US
dc.description.statementofresponsibilityMahfuz Sobhan
dc.description.statementofresponsibilityKhandker Samia Rahman Pranti
dc.description.statementofresponsibilityBashir Siddique
dc.format.extent33 pages
dc.language.isoenen_US
dc.publisherBRAC Universityen_US
dc.rightsBRAC University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectRowhammeren_US
dc.subjectBitflipsen_US
dc.subjectBlacksmithen_US
dc.subjectDRAMen_US
dc.subjectAddress mappingen_US
dc.subject.lcshReverse engineering.
dc.titleReverse engineering Intel DRAM addressing and reproduction of blacksmithen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, BRAC University
dc.description.degreeB.Sc. in Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record