Enlarge / An LG Nexus 5 at the moment it is rooted using Rowhammer-induced bit flips. (credit: van der Veen et al.)
Researchers have devised an attack that gains unfettered “root”
Tag: rowhammer
Existing crypto software “wholly unequipped” to counter Rowhammer attacks.
Approach relies on already installed code, including widely used glibc library.
So the big news this week was the release of details of a very clever hardware attack posted by Google’s Project Zero security initiative called Rowhammer. The impressive part is this is a ha