Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

By [email protected] (Swati Khandelwal) Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer, which involves the exploitation a known vulnerability in DRAM through network cards using remote direct memory access (RDMA) channels.

However, a separate team of security researchers has now demonstrated a second network-based remote Rowhammer technique that can be used to attack systems using

Via:: Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests