Increasingly sophisticated Rowhammer exploits allow an attacker that can execute code on a vulnerable system to escalate privileges and compromise browsers, clouds, and mobile systems. In all these attacks, the common assumption is that attackers first need to obtain code execution on the victim machine to be able to exploit Rowhammer either by having (unprivileged) code execution on the victim machine or by luring the victim to a website that employs a malicious JavaScript application. In this paper, we revisit this assumption and show that an attacker can trigger and exploit Rowhammer bit flips directly from a remote machine by only sending network packets. This is made possible by increasingly fast, RDMA-enabled networks, which are in wi...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
A fundamental assumption in software security is that memory contents do not change unless there is ...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
Over the last two years, the Rowhammer bug transformed from a hard-to-exploit DRAM disturbance error...
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent DDR4 modules are...
Analysing security assumptions taken for the WebRTC and postMessage APIs led us to find a novel atta...
Remote Direct Memory Access (RDMA) is a technology that allows direct access from the network to a m...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
A fundamental assumption in software security is that memory contents do not change unless there is ...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
With software becoming harder to compromise due to modern defenses, attackers are increasingly looki...
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and complete...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
Over the last two years, the Rowhammer bug transformed from a hard-to-exploit DRAM disturbance error...
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent DDR4 modules are...
Analysing security assumptions taken for the WebRTC and postMessage APIs led us to find a novel atta...
Remote Direct Memory Access (RDMA) is a technology that allows direct access from the network to a m...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks ...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...