Hacker News
- Flipping Bits in Memory Without Accessing Them [pdf] http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf 3 comments
- Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf 18 comments programming
Linking pages
- Using Rowhammer bitflips to root Android phones is now a thing | Ars Technica http://arstechnica.com/security/2016/10/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing/ 144 comments
- New cloud attack takes full control of virtual machines with little effort | Ars Technica http://arstechnica.com/security/2016/08/new-attack-steals-private-crypto-keys-by-corrupting-data-in-computer-memory/ 126 comments
- ECCploit: ECC Memory Vulnerable to Rowhammer Attacks After All - https://www.vusec.net/projects/eccploit/ 37 comments
- GitHub - google/rowhammer-test: Test DRAM for bit flips caused by the rowhammer problem https://github.com/google/rowhammer-test 13 comments
- Flip Feng Shui - https://www.vusec.net/projects/flip-feng-shui/ 10 comments
- Googlers' Epic Hack Exploits How Memory Leaks Electricity | WIRED http://www.wired.com/2015/03/google-hack-dram-memory-electric-leaks/ 4 comments
- GitHub - CMU-SAFARI/rowhammer: Source code for testing the Row Hammer error mechanism in DRAM devices. Described in the ISCA 2014 paper by Kim et al. at http://users.ece.cmu.edu/~omutlu/pub/dram-row-hammer_isca14.pdf. https://github.com/CMU-SAFARI/rowhammer 3 comments
- Microsoft Azure uses Error-Correcting Code memory for enhanced reliability and security | Azure Blog and Updates | Microsoft Azure http://azure.microsoft.com/blog/2015/03/16/microsoft-azure-uses-error-correcting-code-memory-for-enhanced-reliability-and-security/ 1 comment
- A Review Of The Intel/x86 KPTI Fiasco https://eklitzke.org/a-review-of-the-intel-x86-kpti-fiasco 0 comments
- As Chips Shrink, Rowhammer Attacks Get Harder to Stop | WIRED http://wired.com/story/rowhammer-half-double-attack-bit-flips/ 0 comments
- Newly Demoed JackHammer Cyberattack Uses FPGA-CPU Combo to Attack Memory | Tom's Hardware https://www.tomshardware.com/news/jackhammer-attack-security-fpga-cpu-rowhammer 0 comments
- Hardware vulnerabilities in cloud-native environments | Kinvolk https://kinvolk.io/blog/2019/03/hardware-vulnerabilities-in-cloud-native-environments/ 0 comments
- Rowhammer hardware bug threatens to smash notebook security | InfoWorld http://www.infoworld.com/article/2894497/security/rowhammer-hardware-bug-threatens-to-smash-notebook-security.html 0 comments
Related searches:
Search whole site: site:users.ece.cmu.edu
Search title: Flipping Bits in Memory Without Accessing Them [pdf]
See how to search.