Unlimited WordPress themes, plugins & video downloads!

Research

Research – SMASH: Synchronized Many-Sided Rowhammer Attacks From JavaScript

In this paper, the authors show that under realistic assumptions, it is indeed possible to bypass TRR directly from JavaScript, allowing attackers to exploit the resurfaced Rowhammer bug inside the browser. In addition, their analysis reveals new requirements for practical TRR evasion. For instance, they discovered that activating many rows in rapid succession as shown in TRRespass may not always be sufficient to produce bit flips. The scheduling of DRAM accesses also plays an important role.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/162192/smash_sec21.pdf

Source: https://packetstormsecurity.com/files/162192/SMASH-Synchronized-Many-Sided-Rowhammer-Attacks-From-JavaScript.html

Related posts
Research

Research - network-intrusion-detection.htm

Research

Research - nid_3pe_v101.pdf

Research

Research - No cON Name 2010 Congress Call For Papers

Research

Research - Norcon Redux Call For Papers

Sign up for our Newsletter and
stay informed