Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detecting Criminal Attacks Using Rowhammer Technology


Affiliations
1 CSE, M.Kumarasamy College of Engineering, Karur, Tamil Nadu, India
2 M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India
     

   Subscribe/Renew Journal


As an evolution of modern era, people are interlinked with social networks and data are stored in phones. All the information are not completely safe. A mass information gathering and connection structure in light of those data that spilled from the remote gadgets that individuals convey. This project is used to find the criminals and anonymous network users by the data. The device named Snoopy is composed in Python. Capable of working in an appropriated manner. Snoopy apparatus can draw particular and abnormal state conclusions and about people details in light of their computerized remote signals from the remote gadgets that individuals convey. The Rowhammer hardware bug allows an attacker to modify memory without accessing it, simply by repeatedly accessing, that is hammering”, a given physical memory location.

Keywords

Android, Criminal, Rowhammer.
User
Subscription Login to verify subscription
Notifications
Font Size

  • E. Ferrara, S. Catanese, P. D. Meo, and G. Fiumara, “Detecting criminal organizations in mobile phone networks”, Expert Systems with Applications, vol. 41, no. 13, pp. 5733-5750, October 2014.
  • E. Dondyk, and C. C. Zou, “Denial of convenience attack to smart phones using a fake Wi-Fi access point,” University of Central Florida: Presentation transcript, 2012.
  • V. V. D. Veen, Y. Fratantonio, M. Lindorfer, “Drammer: Deterministic row hammer attack on mobile platforms,” Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1675-1689, 2016.
  • N. Mahendran, and T. Mekala, “A survey: Sentiment analysis using machine learning techniques for social media analytics,” Journal of Pure and Applied Mathematics, vol. 118, no. 8, pp. 419-422, 2018.
  • C. Selvarathi, and A. Selvi, “Face tracking algorithm for tracking target in WSN,” International Journal of Pure and Applied Mathematics, vol. 118, no.8, pp. 579-584, 2018.

Abstract Views: 359

PDF Views: 0




  • Detecting Criminal Attacks Using Rowhammer Technology

Abstract Views: 359  |  PDF Views: 0

Authors

M. K. Vijaymeena
CSE, M.Kumarasamy College of Engineering, Karur, Tamil Nadu, India
R. Gayathri
M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India
K. Gowri Sankar
M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India
R. R. Nadhaan
M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India

Abstract


As an evolution of modern era, people are interlinked with social networks and data are stored in phones. All the information are not completely safe. A mass information gathering and connection structure in light of those data that spilled from the remote gadgets that individuals convey. This project is used to find the criminals and anonymous network users by the data. The device named Snoopy is composed in Python. Capable of working in an appropriated manner. Snoopy apparatus can draw particular and abnormal state conclusions and about people details in light of their computerized remote signals from the remote gadgets that individuals convey. The Rowhammer hardware bug allows an attacker to modify memory without accessing it, simply by repeatedly accessing, that is hammering”, a given physical memory location.

Keywords


Android, Criminal, Rowhammer.

References