The original research.
https://www.ece.cmu.edu/~safari/pubs/kim-isca14.pdf
Project Zero
http://googleprojectzero.blogspot.co...g-to-gain.html
https://github.com/google/rowhammer-test
The article above discusses the research into rowhammer, and Project Zero's research into it's use to escalate user privileges. At the moment the vulnerability will work on laptops due to the physical size of the memory, also only with Linux and Mac OS X. It is pretty amazing to think we can not alter the physical world through the way code is written.
The main premise of this vulnerability is the fact that by flushing the cache and reading and writing from the same row over and over you are able to build up enough of an electircal charge to cause the adjacent rows to flip. I mean that is pretty fucking awesome.
https://www.ece.cmu.edu/~safari/pubs/kim-isca14.pdf
Project Zero
http://googleprojectzero.blogspot.co...g-to-gain.html
https://github.com/google/rowhammer-test
The article above discusses the research into rowhammer, and Project Zero's research into it's use to escalate user privileges. At the moment the vulnerability will work on laptops due to the physical size of the memory, also only with Linux and Mac OS X. It is pretty amazing to think we can not alter the physical world through the way code is written.
The main premise of this vulnerability is the fact that by flushing the cache and reading and writing from the same row over and over you are able to build up enough of an electircal charge to cause the adjacent rows to flip. I mean that is pretty fucking awesome.