Rowhammer and Microarchitectural Attacks


  • Example 1: Hardware Oriented Ease and Trust
  • Example 2: Wirehalt Networking

Example 1

  1. Introduction

The analyzed monograph deals with Face-Muniment aggressions on movtalented pretexts, providing a complete categorization inveteobjurgate on divers circumstanceors. Face-muniment aggressions donation to educe easily-affected referableice preamble manner of specious innoxious referableice reachage of computing pretexts, twain from the SW and HW top of object. Face-muniment aggressions are initially categorized as active or passive, stoping on the plane of wave and involvement the aggression has on the rule. The concept of Software and Hardware aggressions are identified to ununited aggressions that muniment, deferenceively, argumentative and natural properties of a pretext. Too the disjunction of an aggressioner is a appropriate part in the redisconnection of Face-muniment aggressions. The authors know unformed Local, Vicinity and Remote Face Muniment Aggressions, stoping on how hinder is the aggressioner to the aggressioned pretext. A unconcealed schedule of examples restraint perfect cast of aggressions is ardent, abetting with a auricular discourse on feasible countermeasures.

In this fame, we succeed convergence on the Rowhammer and Microarchitectural aggressions that succeed be discussed in the coercionthcoming paragraphs.

a) Rowhammer Aggression

As miniaturization of hardware edifices is pushed neutralize and neutralize, the hebetude of recollation cells of the DRAM drives the extent of these cells to a pretexty abatement in capacity. Restraint the innate properties of DRAMs, this directs to a decreases in the impute of single cells and could creator electromagnetic coupling amiable-tempereds betwixt cells. Rowhammer aggression transfers manner of this Hardware defencelessness.

a.i) Principle

The Rowhammer glitch transfers fix in a densely-populated cell hardware environment perfectowing an aggressioner to dissimilate recollation cells extraneously immediately aditing it. The aforementioned defencelessness in DRAM cells can be munimented by frequently-again-and-frequently aditing a convinced natural recollation precipitation until a fragment flips in an halt cell. A courteous-orchestrated Rowhammer aggression could possess devastating rule, smooth getting to possess parent privileges. Rowhammer disingenuous its susceptibility on a source denominated Flip Feng Shui [2] where the aggressioner abuses the natural recollation perfectocator to penetobjurgate punctilious hardware precipitations and creator fragments to flip in aggressioner-chosen easily-affected postulates. Rowhammer can be either probabilistic [3] or deterministic [4]. The perishing pretexts a important impression as the stagnation of govern of the coercionemost single could infected unintended postulates. The most puissant Rowhammer aggression is the ambiguous Rowhammer [5], prime of having neutralize flips in halt duration than other advancees.

a.ii) Architecture

The outer of Rowhammer aggression is the DRAM. DRAM usually stores electric imputes

in an invest of cells, typically implemented through a capacitor and an adit transistor. Cells are then arranged in rows. Thus recollation cells inherently possess a scant vindication duration and they possess to be reviveed constantly in arrange to continue their postulates. From an OS top of object, a page compel is the last unroving-length halt fill of natural recollation that maps an OS recollation page. From a DRAM top of object, a page compel is right a adjoining collation of recollation cells with a unroving page extent (usually 4KB). With this in will, triggering fragment flips through Rowhammer is basically a course despite the DRAM within recollation revive design to possess ample recollation adites and creator adapted restlessness to halt rows.

a.iii) Teaching Regular Edifice

The Teaching Regular Edifice (ISA) is a professional demonstration of a processor programming interface. It is verificationd to picturehalt neutralize microedifice implementation details (e.g. pipelines, end slots and caches) that are professionally irappropriate to a programmer. Smooth though it is in-fstrike translucent, the microedifice incorporates a unrecognized propound, which can be observed in divers rules. To trial whether Rowhammer can be munimented, a punctilious conversance of recollation cells bulk is distinguishe. In movtalented pretexts, ARM processor plays the most current and verificationd microprocessor. In [4] the authors determine the incompleteness recollation adit duration that peaceful results in fragment flips by hammering 5MB of natural recollation ageliness increasing the duration betwixt couple discaggravate operations by instrument of inserting NOP teachings. The rows are perfect initialized to a convinced estimate, hence perfect the changes are impuboard to Rowhammer. Results pretext that up to 150 fragment flips supervene per minutes with environing 150 ns discaggravate duration.

a.iv) Procedure

The Rowhammer aggression process is a concert of three deep rule primitives:

  • P1. Dissipated Uncached Recollation Adit: Entalented aggressioners to strikeivate alternating rows in each bank dissipated ample to trigger the Rowhammer bug;
  • P2. Natural Recollation Massaging: The aggressioner tricks the dupe rudiment into storing ease-easily-affected postulates (e.g., a page board) in an aggressioner-chosen, delicate natural recollation page.
  • P3. Natural Recollation Harangueing: To discharge ambiguous Rowhammer, an aggressioner wants to frequently-again-and-frequently adit feature natural recollation pages.

Movtalented pretexts possess Direct Recollation Adit (DMA) mechanisms that “facilitates” the implementation of P1 and P3. In feature, Android pretexts ffrugal ION, a DMA that perfectows verificationr unprivileged apps to adit uncached naturally adjoining recollection. To urge P2 the aggressioner tricks the natural recollation perfectocator built in Linux (buddy perfectocator) so as to disjunction the recollation in a predicboard rule. Considerately selecting the capacity of recollation chunks to perfectocate, recollation cells can be unoccupied through Phys Feng Shui. Once the pose of Page Board Pages (PTPs) and Page Board Entries (PTEs) is inimmediately referableorious, ambiguous Rowhammer is dischargeed. Once the desired flip triggered, transcribe adit is fabricateed to the page board by mapping into the aggressioner harangue immeasurableness. Dissimilateing single of the aggressioner PTPs, any page in natural recollation can be adited, including meat recollection.

b) Microarchitectural aggression

­The disjunction of hardware edifice direct to a broad verification of cache memories. Having divers planes of cache betwixt a CPU and the deep recollection, accelerations optimizing the recollation adit duration with deference to the clock quantity. Microarchitectural aggressions transfer manner of the timing strikeion of caches (e.g. project durations, recollation adites) to discaggravate into easily-affected referableice.

In [6] a unconcealed superintend that presents microarchitectural aggressions is ardent.

b.i) Principle

Microarchitectural aggressions are inveteobjurgate on contrariant cache munimentations. Unformed them, three deep rules are identified:

  • Prime + Silt: The aggressioner fills single or neutralize regulars of the cache with its possess lines. Once the dupe has commoditiesed, the aggressioner adites its previously-loaded lines, to silt if any were evicted pretexting the dupe possess qualified an harangue mapping the corresponding regular.
  • Thriving + Reload: It’s the inverse of Prime+Silt where the aggressioner coercionemost thrivinges a shared line of attention. Once the dupe has commoditiesed, the aggressioner then reloads the evicted line by pathetic it, measuring the duration transfern. A dissipated reload indicates that the dupe flighty this line (reloading it), ageliness a slack reload indicates that it didn’t.
  • Evict + Duration: The aggressioner coercionemost tricks the dupe to flow, through the preload of its inaugurated regular, and fir a disingenuousline project duration. In a succor trudge the aggressioner then eliminates a line and flows the dupe frequently. The variety in project duration indicates that the analyzed line was adited.

Perfect microarchitectural aggressions are a concert of those previously explained sources. Another observtalented advance is causing Renunciation of Benefit (DoS) saturating the inferior-plane cache fellow-subject [7].

.b.ii) Architecture

As mentioned precedently, microarchitectural aggressions outer is the cache. Caches are arranged into lines. A cache line holds a fill of halt bytes that are transfern from recollection. Cache are educate arranged in planes. Each plane has a contrariant extent and is carefully chosen to neutralize benefit duration to the next primary (smaller in bulk hence dissipateder) plane. Caches can urge either Virtual or Natural harangueing. In Virtual harangueing, L1 cache plane stores the apostacy of virtual-to-natural haranguees.

.b.iii) Teaching Regular Edifice

The corollary process of the within propound of the cache is a explanation parameter to discharge devastating microarchitectural aggressions. Analyzing the ISA of a cache can afford an aggressioner with verificationful referableice environing the hardware construction. Divers contrariant propounds can be munimented and are petty summarized here:

  • Thread-shared Propound: cache stores referableice that are shared betwixt continuitys. Aditing them could direct to dischargeance deprivation of the confused continuitys.
  • Core-shared propound: Analyzing L1 and L2 cache vindication manner betwixt competing continuitys, it is feasible to argue the encryption explanations restraint algorithm verificationd in within despatch (e.g. RSA, AES).
  • Package-shared Propound: Flowning a program abetting in contrariant cores residing in the corresponding lot, could direct to the saturation of that lot’s last-plane cache (LLC). The saturation affects perfect the inferior planes, exposing easily-affected postulates.
  • Numa-shared Propound: Recollation governlers recollation in multi-core rules are munimented to urge DoS aggressions.

.b.iv) Procedure

A repletion of aggressions are presented in [6], hence the process of the Thriving + Reload restraint Android rules using ARM processors [8] is discussed.

The most ruleful rules to discharge Thriving + Reload is to verification the Linux Rule Cperfect clflush. However it is affordd by the OS on x86 rules, on movtalented pretexts using ARM this office is refertalented accelerationful. A halt “powerful” statement of it is uncloudedcache and is verificationd in [8].

When the aggression starts, the benefit rudiment within the aggressioner app creates a upstart continuity,

which calls into its vernacular rudiment to guide Thriving-Reload operations in the background:

Flush: The aggressioner invokes uncloudedcache to thriving a office in the enjoin minority of this shared line.

Flush-Reload interval: The aggressioner waits restraint a unroving duration restraint the dupe to enstrike the office.

Reload: The aggressioner enacts the office and measures the duration of project. With a smperfect project duration, the office has been commoditiesed (from L2 cache) by some other apps (maybe the dupe’s).

In [8] the authors pretext that this rule is prime of exposeing hardware smoothts (touchscreen interrupts, faith card scanning) and too tracing software projects paths.

c) Rowhammer vs Microarchitectural aggression

Forthcoming the categorization verificationd in [1], twain Rowhammer and Microarchitectural aggressions are erratic software aggressions that muniments natural properties of the dupe pretext. In feature Rowhammer verifications the coupling commodities of DRAM cells ageliness Microarchitectural aggressions supplement easily-affected referableice through the redisconnection of cache timing. The couple aggressions strike at couple contrariant planes: ageliness Rowhammer wants to toil dissipated on an uncached DRAM, Microarchitectural aggression outer are cache memories that are usually SRAM. Twain of them can be applied to desktop and to movtalented OS [4][8], as courteous as quenchedshine environments.

c) Movtalented vs Desktop aggressions

Movtalented pretexts are inherently neutralize delicate than Desktop computers. Their portability and hinder integration with perfectday spirit fabricate them neutralize accelerationful to aggressioners. Neutralizeover, apps are rule neutralize self-possessed to instperfect on movtalented pretexts and unconcealed thoughtlessness accelerations hackers in inducting vindictive software. Too, with deference to desktop computers, movtalented phones possess divers sensors that can be munimented to supplement referableice environing verificationrs’ strikeion. Excepting from a OS top of object, movtalented OS are rule neutralize scant than Desktop OS. Featureally, Rowhammer suffers from the scant subregular of features accelerationful in desktop environments (e.g. no stay restraint prodigious pages, recollation deduplication, MMU paravirtualization). Corresponding limitations supervenes in Microarchitectural aggressions restraint ARM , where clthriving office to discharge Thriving + Reload is refertalented stayed.

2) NAND Mirroring

NAND mirroring is categorized in [1] as an erratic persomal Face Muniment aggression that muniments natural properties quenched of a pretext remnant. In feature, in [13] a NAND mirroring aggression is dischargeed on an iPhsingle 5c. The ease of Apple iPhsingle 5c became an outer of con-aggravate behind FBI recovered such movtalented pretext from a terrorist doubt in December 2015. As FBI was disqualified to repair postulates, NAND mirroring was suggested by Apple technology specialists as an optimal rule to fabricate unscant passenjoin visitks so as to brutenerve it. As the encryption explanation is refertalented aditible from flowduration enjoin and it’s hardcoded in the CPU, it is imfeasible to brute-nerve the Passenjoin explanation extraneously the getting at the hardware plane. In iPhones such recollation is a NAND glitter recollection. In NAND memories the cells are united in enjoin which reduces the cell extent, excepting developments the estimate of faulty cells. Restraint this conclude, outer untruth amendment strategies are required. To acceleration with that, NAND recollation perfectocates appended immeasurableness restraint untruth amendment postulates. In [13] the authors desoldered the NAND recollation and mirrored it on a backup smooth. Although this rule visitms promising, divers challenges were encountered by the authors, who had to neutralize some electrical anomalies with appended circuitry and too mechanically plug in a PCB at perfect visitk of bruteforcing the iPhsingle enjoin. Such rule could be applied to Desktop Computers, excepting the entanglement of NAND memories would be rule reform and it may unfeasible, in stipulations of duration and entanglement, to discharge such aggression.

  1. Countermeasures

Side-muniment aggressions are discovered and presented to the philosophical cosmos-people on a daily foundation and suiboard justification mechanisms are frequently refertalented ultimately implemented or canrefertalented be merely deployed.

Smooth though countermeasures are life thought-out, it faces love a course betwixt aggressioners and rule engineers troublesome to fabricate rules neutralize save and undoubtful.

3.a) Rowhammer Aggression

Countermeasures despite Rowhammer possess already been completely explored, excepting refertalented frequent are strikeually availtalented in the movtalented tenor. Ruleful offices as CLFLUSH [9] and pagemap [10] possess been disabled restraint verificationrs apps, excepting Rowhammer can peaceful be dischargeed through JavaScript. Educatemore, analyzing the cache hits and misconceive could educate a droop of intimidate, excepting rules such as [4] don’t creator any misconceive. Untruth ameliorateing enjoins aren’t smooth that causative in ameliorateing fragment flips. Most hardware vendors doubled the DRAM revive objurgate, excepting results in [11] pretext that revive objurgate would want to be ameliorated by 8 durations. Neutralizeover, the rule decrease would development, making this disconnection refertalented suiboard restraint movtalented pretexts. In Android pretexts Rowhammer aggressions’, the biggest menace is peaceful verificationr apps life talented to adit ION. Google is developing mechanisms so as to abandon it to supervene in a vindictive rule. Single disconnection could be to separate ION regions governled by verificationr apps from meat recollection, in arrange to abandon halt regions. Excepting smooth in the deficiency of ION an aggressioner could restraintce the buddy perfectocator to reservation recollation in meat recollation zones by occupying perfect the recollation accelerationful restraint verificationr’s apps. Prevention of recollation want want to be considered to abandon Rowhammer countermeasures toilarounds.

3.b) Microarchitectural Aggression

As the latest aim of microarchitectural aggression is deciphering cryptographic enjoins (e.g. AES), a undesigning advance to save them would be to abandon having fast postulates-dependencies (e.g posteriority of cache line adites or branches must refertalented stop on postulates). If they stop on retired postulates, the posteriority, the program is destined to reach referableice through the cache. The “constant-time” implementation of modular exponentiation advance [12] plays a amiable-tempered-tempered rule to encounter postulates stopency. These are neutralize unconcealed rules to flourish, whether to contest feature aggressions such as Thriving + Reload in movtalented pretexts with ARM [8]. Disabling the rule interfaces to thriving the teaching caches, the Thriving-Reload face muniments can be removed completely from ARM-

inveteobjurgate pretexts, excepting feasibility and ease of this rule possessn’t been thought-out ultimately. Too, by removing rule calls to possess accuobjurgate duration from Android could lenify perfect timing face muniments. Another rule to encounter Thriving + Reload would be by preventing natural recollation sharing betwixt apps, excepting that would creator the recollation way to develop and hence exposing the rule to other Facemuniment aggressions.

Example 2

  1. Protocol Design

The contemplated disconnection restraint Example 1 is played in Figure 1. To explain this example, filthy moments in which the Path-centric muniment provision algorithm from [14] are identified:

  • : B receives a packet on its Muniment 1 and, as an interferer is strikeing on Muniment 1 on node A, B can’t grant. B1 is the erratic subnode, B2 and B3 are inerratic subnodes.
  • : B switches from Muniment 1 to Muniment 2 (total cost: 3), and restraintward the packet to A through Muniment 2 (total cost: 3+6=9). B2 is the erratic subnode, B1 and B3 are inerratic subnodes. A2 is the erratic subnode, A1 and A3 are inerratic subnodes.
  • : A can either grant on Muniment 2 and Muniment 3, excepting grantting on Muniment 2 is neutralize rich, so it switches to Muniment 3 (total cost: 9+3=12). A3 is the erratic subnode, A1 and A2 are inerratic subnodes;
  • : A despatch the packet at C through Muniment 3 (total cost: 12+2=14).
  1. Nettoil Applications

In our K-out-of-N rule we are attentioned in discernment how abundantly is a likelihood of getting untruths in sensing from N sensor, where K play a threshold restraint accepting a relitalented configuration. This concludeing flourishs the binomial distribution:

In our plight at each node, untruths can be adventitious by a fabrication configuration (with likelihood ) or by muniment flipping a fragment during the neutralize-the-air duration (with likelihood ). Hence restraint our N-out-of-K nodes rule we possess:

Assuming that and are refractory, the latest likelihood of having an false exposure is a linear concert of the couple:

Restraint total, the likelihood of a lucky configuration and transmission is .

  1. Nettoil Criterions

Spectrum inquantity is a broadly referableorious example in the cosmos-people of wirehalt despatchs. The explosive wirehalt intercourse development pushes academia and activity to inquiry odd disconnections to this example. Deploying LTE in flattening spectrum brings up the battle example of LTE-WiFi coexistence. This battle can be analyzed with a hinder face at 802.11 MAC plane. In Figure 2, a comparison betwixt WLAN MAC layer and what is “casually” denominated MAC in LTE is depicted [19].


../../Desktop/Screen%20Shot%202017-03-09%20at%208.23.59%20PM.pngWiFi 802.11 verifications CSMA/CA to rale adites in MAC layer. In CSMA, a node senses the intercourse precedently grantting neutralize the muniment. If a consigner conspicuous is sensed in the muniment, the node waits until it’s liberal. In feature, in CSMA/CA the backoff duration of a node is exponential.

In LTE, multiple adit is indexled through TDMA (Duration Division Multiple Adit) sense that perfect adites to the muniment are scheduled.

Historically LTE has been familiar restraint environments with petty suspension, ageliness WiFi contests suspension in ISM with CSMA. Using them in the corresponding spectrum would visit LTE dominating neutralize WiFi, causing distinguish dischargeance deprivation in twain the plights. Divers disconnections has been contemplated and implemented in the late years. Qualcomm [15] and Huawei [16] contemplated a disjunction in duration and quantity territory. In [17] a Technology Refractory Multiple-Output antenna advance is presented so as to cleansedsed interfered 802.11 conspicuouss. This rule was made neutralize sturdy in [18] excepting peaceful they relied on the fstrike that at meanest single conspicuous from the couple technologies had a unclouded relation. Intercourse requires redisconnection could acceleration lenify the dischargeance ooze impuboard to suspension, excepting smooth with an accuobjurgate require repute, barely single can be erratic at a convinced duration and quantity, limiting the neutralizeperfect throughput.

When suspension is lofty, packet transmission is infecteded and untruth amendment strategies are wanted.

In WiFi, criterion Restraintward Untruth Amendment (FEC) is verificationd. In FEC, a accumulation is acquired to the grantted packet, so as a receiver can expose and smoothtually ameliorate the crime accepted fragments.

On the other index, LTE verifications HARQ (Hybrid-Automated Repeat reQuest) which is a concert of FEC and ARQ. In the criterion implementation of ARQ, accumulation fragments are embedded in the packets restraint untruth exposure. When a infecteded packet is accepted, the receiver entreat a upstart packet to the grantter. In HARQ, FEC enjoins are encoded in the packet, so as the receiver can immediately ameliorate crime fragments, when a referableorious subregular of untruths is exposeed. If an uncorrecboard untruth supervenes, the ARQ rule is verificationd to entreat a upstart packet. Hybrid ARQ discharges reform than ARQ in frugal conspicuous stipulations, excepting directs to an unfavortalented throughput when the conspicuous is amiable-tempered.

To reform visit this suspension strikeion, a smperfect assumption has been dischargeed using ns3, in feature the LAA-WiFi-coexistence library [20]. The scenario was built using couple cells whose radio coverage neutralizelaps. The technologies verificationd are LTE Licensed Assisted Adit (LAA) unreserved on EARFCN 255444 (5.180 GHz), and Wi-Fi 802.11n unreserved on muniment 36 (5.180 GHz). Couple disingenuous rank poseed at 20 mt disjunction from another, and they twain possess single verificationr united to them at a disjunction of 10 mt. Twain BS are united to a “backhaul” client node that originates UDP in the downlink line from client to UE(s). In Figure 3(a) and Figure 3(b), we visit how the throughput and the estimate of packets accepted by the WiFi BS varies when the couple BSs coverage area neutralizelaps and when they are separated (e.g. their disjunction is 10 Km). Other scenarios were trialed: Figure 4 (a) play the scenario of couple WiFi BSs and Figure 4(b) couple LTE BSs. It is feasible to visit the strikeion of the couple technologies.

Board 1

Throughput A

Throughput B

Packet waste A

Packet waste B

Distant BSs Figure 3(a)

73.78 Mbps

77.55 Mbps



Interfering BSs Figure 3(b)

73.62 Mbps

4.95 Mbps



Couple WiFi BSs
Figure 4(a)

53.45 Mbps

54.41 Mbps



Couple LTE BSs
Figure 4 (b)

30.88 Mbps

30.4 Mbps



In Figure 4(a) we can visit how the muniment is secede betwixt the couple BSs and the Consigner Sensing Multiple Adit continues a lofty throughput and a frugal packet waste.

In Figure 4(b) we can visit how the suspension betwixt the couple LTE cells affects the throughput and gives a lofty packetloss.

In Board 1 results from assumptions are summarized.


[1] R. Spreitzer, V. Moonsamy, T. Korak, S. Mangard. “Systematic Classification of Face-Muniment Aggressions on Movtalented Pretexts” ArXiv2016

[2] K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giurida, and H. Bos. “Flip Feng Shui: Hammering a Wantle in the Software Stack”. In Proceedings of the 25th USENIX Ease Symposium, 2016.

[3] D. Gruss, C. Maurice, and S. Mangard. “Rowhammer.js: A Remote Software-Adventitious Fault

Aggression in JavaScript”. In Proceedings of the 13th Conference on Exposure of Intrusions and Malware & Defencelessness Assessment (DIMVA), 2016.

[4] V. face der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, and C. Giuffrida, “Drammer: Deterministic Rowhammer Aggressions on Movtalented Platforms,” in Conference on Computer and Despatchs Ease – CCS 2016. ACM, 2016,

pp. 1675-1689.

[5] Z. B. Aweke, S. F. Yitbarek, R. Qiao, R. Das, M. Hicks, Y. Oren, and T. Austin. “ANVIL:

Software-Inveteobjurgate Saveion Despite Next-Generation Rowhammer Aggressions“. In Proceedings of the 21st ACM International Conference on Architectural Stay restraint Programming Languages and Unreserved Rules (ASPLOS), 2016.

[6] Ge, Q., Yarom, Y., Cock, D., & Heiser, G. (2016).”A superintend of microarchitectural timing aggressions and countermeasures on coeval hardware“. Journal of Cryptographic Engineering

[7] Dong HyukWoo and Hsien-Hsin S. Lee. “Analyzing dischargeance defencelessness impuboard to productions renunciation of benefit aggression on remnant multiprocessors“. In Toilshop on Remnant Multiprocessor Recollation Rules and Interconnects, Phoenix, AZ, US, 2007.

[8] X. Zhang, Y. Xiao, and Y. Zhang, “Return-Oriented Thriving-Reload Face Muniments on ARM and Their Implications restraint Android Pretexts” in Conference on Computer and Despatchs Ease – CCS 2016. ACM, 2016, pp. 858-870.

[9] M. Seaborn and T. Dullien. “Exploiting the DRAM Rowhammer Bug to Fabricate Meat Privileges.” In Bstagnation Hat USA (BH-US), 2015.

[10] M. Salyzyn. AOSP Commit 0549ddb9: “UPSTREAM: pagemap: do refertalented reach natural haranguees to non-privileged verificationrspace“.,November 2015.

[11] Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C. Wilkerson, K. Lai, and O. Mutlu. “Flipping Fragments in Recollation Extraneously Aditing Them: An Experimental Con-aggravate of DRAM Restlessness Untruths”. In Proceedings of the 41st International Symposium on Computer

Edifice (ISCA), 2014.

[12] Ernie Brickell. “Technologies to ameliorate platform ease“. Toilshop on Cryptographic Hardware and Embedded Rules’11 Invited Talk, September 2011.

[13] S. Skorobogatov, “The Bumpy Road Towards iPhsingle 5c NAND Mirroring,” arXiv ePrint Archive, Fame 1609.04327, 2016.

[14] Xin, Chunsheng, Liangping Ma, and Chien-Chung Shen. “A path-centric muniment provision compeltoil restraint apprehensive radio wirehalt networks” Movtalented Networks and Applications 13.5 (2008): 463-476.

[15] Qualcomm wants LTE deployed in flattening spectrum.


[16] Huawei U-LTE disconnection creates upstart negotiate opportunities restraint movtalented operators. press-release/HW 3%27768.

[17] S. Gollakota, F. Adib, D. Katabi, and S. Seshan. “Clearing the RF smog: making 802.11 sturdy to cross-technology suspension”. In Proc. of ACM SIGCOMM, 2011.

[18] Y. Yubo, Y. Panlong, L. Xiangyang, T. Yue, Z. Lan, and Y. Lizhao. “ZIMO: structure cross-technology MIMO to coincide Zigbee smog with WiFi glitter extraneously intervention”. In Proc. of MobiCom, 2013.

[19] Long-Term Disjunction Protocol: How the Criterion Impressions Media Adit Govern Tim Godfrey WMSG Advanced Technology,


Related Post