Open Access
Subscription Access
Open Access
Subscription Access
Detecting Criminal Attacks Using Rowhammer Technology
Subscribe/Renew Journal
As an evolution of modern era, people are interlinked with social networks and data are stored in phones. All the information are not completely safe. A mass information gathering and connection structure in light of those data that spilled from the remote gadgets that individuals convey. This project is used to find the criminals and anonymous network users by the data. The device named Snoopy is composed in Python. Capable of working in an appropriated manner. Snoopy apparatus can draw particular and abnormal state conclusions and about people details in light of their computerized remote signals from the remote gadgets that individuals convey. The Rowhammer hardware bug allows an attacker to modify memory without accessing it, simply by repeatedly accessing, that is hammering”, a given physical memory location.
Keywords
Android, Criminal, Rowhammer.
User
Subscription
Login to verify subscription
Font Size
Information
- E. Ferrara, S. Catanese, P. D. Meo, and G. Fiumara, “Detecting criminal organizations in mobile phone networks”, Expert Systems with Applications, vol. 41, no. 13, pp. 5733-5750, October 2014.
- E. Dondyk, and C. C. Zou, “Denial of convenience attack to smart phones using a fake Wi-Fi access point,” University of Central Florida: Presentation transcript, 2012.
- V. V. D. Veen, Y. Fratantonio, M. Lindorfer, “Drammer: Deterministic row hammer attack on mobile platforms,” Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1675-1689, 2016.
- N. Mahendran, and T. Mekala, “A survey: Sentiment analysis using machine learning techniques for social media analytics,” Journal of Pure and Applied Mathematics, vol. 118, no. 8, pp. 419-422, 2018.
- C. Selvarathi, and A. Selvi, “Face tracking algorithm for tracking target in WSN,” International Journal of Pure and Applied Mathematics, vol. 118, no.8, pp. 579-584, 2018.
Abstract Views: 358
PDF Views: 0