274

LeapFrog: The Rowhammer Instruction Skip Attack

European Symposium on Security and Privacy (EuroS&P), 2024
Main:13 Pages
13 Figures
Bibliography:3 Pages
7 Tables
Abstract

Since its inception, Rowhammer exploits have rapidly evolved into increasingly sophisticated threats compromising data integrity and the control flow integrity of victim processes. Nevertheless, it remains a challenge for an attacker to identify vulnerable targets (i.e., Rowhammer gadgets), understand the outcome of the attempted fault, and formulate an attack that yields useful results.

View on arXiv
Comments on this paper