{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T22:34:33Z","timestamp":1776378873706,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T00:00:00Z","timestamp":1509148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N000141512162"],"award-info":[{"award-number":["N000141512162"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Mozilla"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1500084, CNS-1563848, CNS-1704701 and CRI-1629851"],"award-info":[{"award-number":["DGE-1500084, CNS-1563848, CNS-1704701 and CRI-1629851"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2017R1A6A3A03002506"],"award-info":[{"award-number":["2017R1A6A3A03002506"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["DARPA FA8650-15-C-7556 and DARPA HR0011-16-C-0059"],"award-info":[{"award-number":["DARPA FA8650-15-C-7556 and DARPA HR0011-16-C-0059"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003696","name":"Electronics and Telecommunications Research Institute","doi-asserted-by":"publisher","award":["IITP\/KEIT[B0101-17-0644]"],"award-info":[{"award-number":["IITP\/KEIT[B0101-17-0644]"]}],"id":[{"id":"10.13039\/501100003696","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005801","name":"Facebook","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005801","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1145\/3152701.3152709","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":117,"title":["SGX-Bomb"],"prefix":"10.1145","author":[{"given":"Yeongjin","family":"Jang","sequence":"first","affiliation":[{"name":"Oregon State University"}]},{"given":"Jaehyuk","family":"Lee","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Sangho","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2017,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon. 2017. Amazon EC2 Service Level Agreement. (2017). https:\/\/aws.amazon.com\/ec2\/sla\/.  Amazon. 2017. Amazon EC2 Service Level Agreement. (2017). https:\/\/aws.amazon.com\/ec2\/sla\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872390"},{"key":"e_1_3_2_1_3_1","first-page":"117","article-title":"Row Hammer Refresh Command. (Aug. 25 2015)","volume":"9","author":"Bains Kuljit","year":"2015","unstructured":"Kuljit Bains , John Halbert , Christopher Mozak , Theodore Schoenborn , and Zvika Greenfield . 2015 . Row Hammer Refresh Command. (Aug. 25 2015) . US Patent 9 , 117 ,544. Kuljit Bains, John Halbert, Christopher Mozak, Theodore Schoenborn, and Zvika Greenfield. 2015. Row Hammer Refresh Command. (Aug. 25 2015). US Patent 9,117,544.","journal-title":"US Patent"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland)","author":"Bosman E.","unstructured":"E. Bosman , K. Razavi , H. Bos , and C. Giuffrida . 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector . In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland) . San Jose, CA. E. Bosman, K. Razavi, H. Bos, and C. Giuffrida. 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland). San Jose, CA."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Lucas Davi , David Gens , Christopher Liebchen , and Ahmad-Reza Sadeghi . 2017 . CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory . In Proceedings of the 26th USENIX Security Symposium (Security) . Vancouver, BC, Canada. Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2017. CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC, Canada."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Urs M\u00fcller , Alexandra Dmitrienko , Kari Kostiainen , Srdjan Capkun , and Ahmad-Reza Sadeghi . 2017 . Software Grand Exposure: SGX Cache Attacks Are Practical . In Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT) . Vancouver, BC, Canada. Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. In Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT). Vancouver, BC, Canada."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R. Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In Proceedings of the 26th USENIX Security Symposium (Security) . Vancouver, BC, Canada. Jo Van Bulck, Nico Weichbrodt, R. Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC, Canada."},{"key":"e_1_3_2_1_8_1","unstructured":"S. Chhabra U.R. Savagaonkar M.A. Goldsmith S.P. Johnson R.M. Leslie-Hurd F.X. Mckeen G. Neiger R. MAKARAM C.V. Rozas A.L. Santoni etal 2016. Secure memory repartitioning. (Aug. 3 2016). https:\/\/google.com\/patents\/EP3049992A1?cl=no EP Patent App. EP20 140 849 831.  S. Chhabra U.R. Savagaonkar M.A. Goldsmith S.P. Johnson R.M. Leslie-Hurd F.X. Mckeen G. Neiger R. MAKARAM C.V. Rozas A.L. Santoni et al. 2016. Secure memory repartitioning. (Aug. 3 2016). https:\/\/google.com\/patents\/EP3049992A1?cl=no EP Patent App. EP20 140 849 831."},{"key":"e_1_3_2_1_9_1","unstructured":"Jonathan Corbet. 2016. Defending against Rowhammer in the kernel. (2016). https:\/\/lwn.net\/Articles\/704920\/.  Jonathan Corbet. 2016. Defending against Rowhammer in the kernel. (2016). https:\/\/lwn.net\/Articles\/704920\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Victor Costan Ilia Lebedev Srinivas Devadas etal 2017. Secure Processors Part I: Background Taxonomy for Secure Enclaves and Intel SGX Architecture. Foundations and Trends\u00ae in Electronic Design Automation 11 1--2 (2017) 1--248.  Victor Costan Ilia Lebedev Srinivas Devadas et al. 2017. Secure Processors Part I: Background Taxonomy for Secure Enclaves and Intel SGX Architecture. Foundations and Trends\u00ae in Electronic Design Automation 11 1--2 (2017) 1--248.","DOI":"10.1561\/1000000051"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Victor Costan Ilia Lebedev Srinivas Devadas etal 2017. Secure Processors Part II: Intel SGX security analysis and MIT Sanctum Architecture. Foundations and Trends\u00ae in Electronic Design Automation 11 3 (2017) 249--361.  Victor Costan Ilia Lebedev Srinivas Devadas et al. 2017. Secure Processors Part II: Intel SGX security analysis and MIT Sanctum Architecture. Foundations and Trends\u00ae in Electronic Design Automation 11 3 (2017) 249--361.","DOI":"10.1561\/1000000052"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2595642"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_15_1","first-page":"204","article-title":"A Memory Encryption Engine Suitable for General Purpose Processor","volume":"2016","author":"Gueron Shay","year":"2016","unstructured":"Shay Gueron . 2016 . A Memory Encryption Engine Suitable for General Purpose Processor . IACR Cryptology ePrint Archive 2016 (2016), 204 . Shay Gueron. 2016. A Memory Encryption Engine Suitable for General Purpose Processor. IACR Cryptology ePrint Archive 2016 (2016), 204.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (ATC)","author":"H\u00e4hnel M.","unstructured":"M. H\u00e4hnel , W. Cui , and M. Peinado . 2017. High-Resolution Side Channels for Untrusted Operating Systems . In Proceedings of the 2017 USENIX Annual Technical Conference (ATC) . Santa Clara, CA. M. H\u00e4hnel, W. Cui, and M. Peinado. 2017. High-Resolution Side Channels for Untrusted Operating Systems. In Proceedings of the 2017 USENIX Annual Technical Conference (ATC). Santa Clara, CA."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Hunt Tyler","year":"2016","unstructured":"Tyler Hunt , Zhiting Zhu , Yuanzhong Xu , Simon Peter , and Emmett Witchel . 2016 . Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) . Savannah, GA. Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. 2016. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Savannah, GA."},{"key":"e_1_3_2_1_18_1","volume-title":"ISCA 2015","year":"2015","unstructured":"Intel. 2015 . SGX Tutorial , ISCA 2015 . http:\/\/sgxisca.weebly.com\/. (June 2015). Intel. 2015. SGX Tutorial, ISCA 2015. http:\/\/sgxisca.weebly.com\/. (June 2015)."},{"key":"e_1_3_2_1_19_1","volume-title":"Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C and 3D. (Sept","year":"2016","unstructured":"Intel. 2016. Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C and 3D. (Sept . 2016 ). Intel. 2016. Intel 64 and IA-32 Architectures Software Developer's Manual Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C and 3D. (Sept. 2016)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2016 USENIX Annual Technical Conference (ATC)","author":"Kashyap Sanidhya","year":"2016","unstructured":"Sanidhya Kashyap , Changwoo Min , Byoungyoung Lee , Taesoo Kim , and Pavel Emelyanov . 2016 . Instant OS Updates via Userspace Checkpoint-and-Restart . In Proceedings of the 2016 USENIX Annual Technical Conference (ATC) . Denver, CO. Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, and Pavel Emelyanov. 2016. Instant OS Updates via Userspace Checkpoint-and-Restart. In Proceedings of the 2016 USENIX Annual Technical Conference (ATC). Denver, CO."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665726"},{"key":"e_1_3_2_1_22_1","unstructured":"M Lanteigne. 2016. How rowhammer could be used to exploit weaknesses in computer hardware. (2016). http:\/\/www.thirdio.com\/rowhammer.pdf.  M Lanteigne. 2016. How rowhammer could be used to exploit weaknesses in computer hardware. (2016). http:\/\/www.thirdio.com\/rowhammer.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Lee Jaehyuk","unstructured":"Jaehyuk Lee , Jinsoo Jang , Yeongjin Jang , Nohyun Kwak , Yeseul Choi , Changho Choi , Taesoo Kim , Marcus Peinado , and Brent B. Kang . 2017. Hacking in Darkness: Return-oriented Programming against Secure Enclaves . In Proceedings of the 26th USENIX Security Symposium (Security) . Vancouver, BC, Canada. Jaehyuk Lee, Jinsoo Jang, Yeongjin Jang, Nohyun Kwak, Yeseul Choi, Changho Choi, Taesoo Kim, Marcus Peinado, and Brent B. Kang. 2017. Hacking in Darkness: Return-oriented Programming against Secure Enclaves. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC, Canada."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241233"},{"key":"e_1_3_2_1_25_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378 . Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 369--378."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (Security)","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Clementine Maurice , Michael Schwarz , and Stefan Mangard . 2016 . DRAMA: Exploiting DRAM addressing for cross-CPU attacks . In Proceedings of the 25th USENIX Security Symposium (Security) . Austin, TX. Peter Pessl, Daniel Gruss, Clementine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM addressing for cross-CPU attacks. In Proceedings of the 25th USENIX Security Symposium (Security). Austin, TX."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (Security)","author":"Razavi Kaveh","year":"2016","unstructured":"Kaveh Razavi , Ben Gras , Erik Bosman , Bart Preneel , Cristiano Giuffrida , and Herbert Bos . 2016 . Flip Feng Shui: Hammering a needle in the software stack . In Proceedings of the 25th USENIX Security Symposium (Security) . Austin, TX. Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. 2016. Flip Feng Shui: Hammering a needle in the software stack. In Proceedings of the 25th USENIX Security Symposium (Security). Austin, TX."},{"key":"e_1_3_2_1_28_1","first-page":"184","article-title":"Method and system for providing independent bank refresh for volatile memories. (Feb. 27 2007)","volume":"7","author":"Remaklus Perry Willmann","year":"2007","unstructured":"Perry Willmann Remaklus Jr and Robert Michael Walker . 2007 . Method and system for providing independent bank refresh for volatile memories. (Feb. 27 2007) . US Patent 7 , 184 ,350. Perry Willmann Remaklus Jr and Robert Michael Walker. 2007. Method and system for providing independent bank refresh for volatile memories. (Feb. 27 2007). US Patent 7,184,350.","journal-title":"US Patent"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).","author":"Schwarz M.","unstructured":"M. Schwarz , S. Weiser , D. Gruss , C. Maurice , and S. Mangard . 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks . In Proceedings of the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA). M. Schwarz, S. Weiser, D. Gruss, C. Maurice, and S. Mangard. 2017. Malware Guard Extension: Using SGX to Conceal Cache Attacks. In Proceedings of the 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)."},{"key":"e_1_3_2_1_31_1","volume-title":"Black Hat USA Briefings (Black Hat USA).","author":"Seaborn Mark","unstructured":"Mark Seaborn and Thomas Dullien . 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges . In Black Hat USA Briefings (Black Hat USA). Las Vegas, NV . Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. In Black Hat USA Briefings (Black Hat USA). Las Vegas, NV."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897885"},{"key":"e_1_3_2_1_33_1","unstructured":"Chris Smith. 2017. Amazon finally explained what happened when it accidentally took down the internet. (2017). http:\/\/bgr.com\/2017\/03\/02\/why-internet-isnt-working-amazon-aws-outage\/.  Chris Smith. 2017. Amazon finally explained what happened when it accidentally took down the internet. (2017). http:\/\/bgr.com\/2017\/03\/02\/why-internet-isnt-working-amazon-aws-outage\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (Security)","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao , Xiaokuan Zhang , Yinqian Zhang , and MR Teodorescu . 2016 . One bit flips, one cloud flops: Cross-VM row hammer attacks and privilege escalation . In Proceedings of the 25th USENIX Security Symposium (Security) . Austin, TX. Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and MR Teodorescu. 2016. One bit flips, one cloud flops: Cross-VM row hammer attacks and privilege escalation. In Proceedings of the 25th USENIX Security Symposium (Security). Austin, TX."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","location":"Shanghai China","acronym":"SOSP '17","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2nd Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152709","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152701.3152709","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152701.3152709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:09Z","timestamp":1750212669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152709"}},"subtitle":["Locking Down the Processor via Rowhammer Attack"],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":37,"alternative-id":["10.1145\/3152701.3152709","10.1145\/3152701"],"URL":"https:\/\/doi.org\/10.1145\/3152701.3152709","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]},"assertion":[{"value":"2017-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}