April 12, 2024, 4:11 a.m. | Andrew Adiletta, Caner Tol, Berk Sunar

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.07878v1 Announce Type: new
Abstract: Since its inception, Rowhammer exploits have rapidly evolved into increasingly sophisticated threats not only compromising data integrity but also the control flow integrity of victim processes. Nevertheless, it remains a challenge for an attacker to identify vulnerable targets (i.e., Rowhammer gadgets), understand the outcome of the attempted fault, and formulate an attack that yields useful results.
In this paper, we present a new type of Rowhammer gadget, called a LeapFrog gadget, which, when present in …

arxiv attack attacker challenge control cs.ar cs.cr data data integrity exploits flow gadgets identify inception integrity processes rowhammer threats understand victim vulnerable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC