April 15, 2024, 4:10 a.m. | Andrew J. Adiletta, M. Caner Tol, Yark{\i}n Dor\"oz, Berk Sunar

cs.CR updates on arXiv.org arxiv.org

arXiv:2309.02545v2 Announce Type: replace
Abstract: In the past decade, many vulnerabilities were discovered in microarchitectures which yielded attack vectors and motivated the study of countermeasures. Further, architectural and physical imperfections in DRAMs led to the discovery of Rowhammer attacks which give an adversary power to introduce bit flips in a victim's memory space. Numerous studies analyzed Rowhammer and proposed techniques to prevent it altogether or to mitigate its effects.
In this work, we push the boundary and show how Rowhammer …

adversary arxiv attack attacks attack vectors corruption countermeasures cs.cr discovery led memory physical power register rowhammer stack study victim vulnerabilities

Azure DevSecOps Cloud Engineer II

@ Prudent Technology | McLean, VA, USA

Security Engineer III - Python, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SOC Analyst (Threat Hunter)

@ NCS | Singapore, Singapore

Managed Services Information Security Manager

@ NTT DATA | Sydney, Australia

Senior Security Engineer (Remote)

@ Mattermost | United Kingdom

Penetration Tester (Part Time & Remote)

@ TestPros | United States - Remote