Nethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests
Recent advancements in cyber-attack methodologies have seen the emergence of a novel network-based variant of the notorious Rowhammer attack, referred to as “Nethammer.” This approach exploits vulnerabilities in dynamic random access memory (DRAM) through network cards, and it capitalizes on…