<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-17T00:45:24Z</responseDate>
  <request metadataPrefix="jpcoar_1.0" verb="GetRecord" identifier="oai:ipsj.ixsq.nii.ac.jp:00208485">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00208485</identifier>
        <datestamp>2025-01-19T18:50:45Z</datestamp>
        <setSpec>6164:6165:6462:10428</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>DRAMに対する効果的なRAMBleed攻撃の提案</dc:title>
          <dc:title xml:lang="en">Effective RAMBleed Attack on DRAM</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>西尾, 和浩</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>瀧田, 愼</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>廣友, 雅徳</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>白石, 善明</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>森井, 昌克</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kazuhiro, Nishio</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Makoto, Takita</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Masanori, Hirotomo</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Yoshiaki, Shiraishi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Masakatu, Morii</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">サイドチャネル攻撃，DRAM，Rowhammer，RAMBleed</jpcoar:subject>
          <datacite:description descriptionType="Other">大容量のDRAMが作られるようになり，計算機の性能が向上している．一方で，DRAM内で意図しないビット反転が生じるRowhammerと呼ばれる問題が指摘されている．Rowhammerを利用した攻撃は多数存在し，ソフトウェアで容易に実行可能であるため，コンピュータシステムのセキュリティへの影響が懸念されている．&lt;br&gt;RAMBleed はRowhammerにより意図的に引き起こしたビット反転を観測することで直接アクセスできない情報を読み取るサイドチャネル攻撃である．RAMBleedの課題として，攻撃にかかる時間があげられる．&lt;br&gt;本稿では，攻撃時間を短縮する目的で，従来のRAMBleedの攻撃手順を見直し，ビット反転確率の高いビット位置を利用したRAMBleed攻撃を提案する．提案手法と従来のRAMBleedを実装し，秘密情報の回復精度と攻撃時間の比較実験を行った．実験の結果，提案手法では，従来のRAMBleedの回復精度を保ったまま，秘密情報の回復時間を約60％に短縮できることを示した．</datacite:description>
          <datacite:description descriptionType="Other">The high-capacity DRAM has improved the performance of computers. On the other hand, a problem called Rowhammer, in which unintended bit flips occur in DRAM, has been pointed out. There are many attacks using Rowhammer and can be easily executed by software, which is a serious problem in computer system security. RAMBleed is a side channel attack that reads information that cannot be accessed directly by observing bit flips caused by Rowhammer. The issue of RAMBleed is the time it takes to attack.&lt;br&gt; In this paper, in order to reduce the attack time, we review the conventional RAMBleed attack procedure and propose a RAMBleed attack that uses bit positions with high bit flip probability. We implemented the proposed method and conventional RAMBleed, and compared them. As a result, we show that the proposed method can reduce the attack time by about 60% while maintaining the recovery accuracy of conventional RAMBleed.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2020-10-19</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/208485</jpcoar:identifier>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2020論文集</jpcoar:sourceTitle>
          <jpcoar:pageStart>410</jpcoar:pageStart>
          <jpcoar:pageEnd>415</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJCSS2020057.pdf">https://ipsj.ixsq.nii.ac.jp/record/208485/files/IPSJCSS2020057.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>794.4 kB</jpcoar:extent>
            <datacite:date dateType="Available">2022-10-19</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
