Nethammer: Leveraging the DRAM Rowhammer Vulnerability via Network Requests
Recent advancements in cyber-attack methodologies have seen the emergence of a novel network-based variant of the notorious Rowhammer attack, referred to as “Nethammer.” This approach exploits vulnerabilities in dynamic random access memory (DRAM) through network cards, and it capitalizes on remote direct memory access (RDMA) channels to manipulate memory states…