LeapFrog: The Rowhammer Instruction Skip Attack
European Symposium on Security and Privacy (EuroS&P), 2024
Main:13 Pages
13 Figures
Bibliography:3 Pages
7 Tables
Abstract
Since its inception, Rowhammer exploits have rapidly evolved into increasingly sophisticated threats compromising data integrity and the control flow integrity of victim processes. Nevertheless, it remains a challenge for an attacker to identify vulnerable targets (i.e., Rowhammer gadgets), understand the outcome of the attempted fault, and formulate an attack that yields useful results.
View on arXivComments on this paper
