ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2007.08707
  4. Cited By
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses
v1v2 (latest)

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses

17 July 2020
Zhi-Li Zhang
Yueqiang Cheng
Dongxi Liu
Surya Nepal
Zhi Wang
Y. Yarom
ArXiv (abs)PDFHTML

Papers citing "PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses"

13 / 13 papers shown
Title
Revisiting DRAM Read Disturbance: Identifying Inconsistencies Between Experimental Characterization and Device-Level Studies
Revisiting DRAM Read Disturbance: Identifying Inconsistencies Between Experimental Characterization and Device-Level Studies
Haocong Luo
Ismail Emir Yüksel
Ataberk Olgun
A. Giray Yağlıkçı
O. Mutlu
80
1
0
20 Mar 2025
Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices
  and Mitigation Techniques
Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques
Jeremie S. Kim
Minesh Patel
A. G. Yaglikçi
Hasan Hassan
Roknoddin Azizi
Lois Orosa
O. Mutlu
45
185
0
27 May 2020
TRRespass: Exploiting the Many Sides of Target Row Refresh
TRRespass: Exploiting the Many Sides of Target Row Refresh
Pietro Frigo
Emanuele Vannacci
Hasan Hassan
V. V. D. Veen
O. Mutlu
Cristiano Giuffrida
H. Bos
Kaveh Razavi
48
229
0
03 Apr 2020
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud
  Providers
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
L. Cojocar
Jeremie S. Kim
Minesh Patel
L. Tsai
S. Saroiu
A. Wolman
O. Mutlu
47
104
0
10 Mar 2020
Theory and Practice of Finding Eviction Sets
Theory and Practice of Finding Eviction Sets
Pepe Vila
Boris Köpf
J. Morales
37
130
0
02 Oct 2018
Speculative Buffer Overflows: Attacks and Defenses
Speculative Buffer Overflows: Attacks and Defenses
Vladimir Kiriansky
Carl A. Waldspurger
SILM
38
194
0
10 Jul 2018
Nethammer: Inducing Rowhammer Faults through Network Requests
Nethammer: Inducing Rowhammer Faults through Network Requests
Moritz Lipp
Misiker Tadesse Aga
Michael Schwarz
Daniel Gruss
Clémentine Maurice
Lukas Raab
Lukas Lamster
58
135
0
13 May 2018
CATTmew: Defeating Software-only Physical Kernel Isolation
CATTmew: Defeating Software-only Physical Kernel Isolation
Yueqiang Cheng
Zhi-Li Zhang
Surya Nepal
Zhi Wang
52
17
0
20 Feb 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
74
2,187
0
03 Jan 2018
Another Flip in the Wall of Rowhammer Defenses
Another Flip in the Wall of Rowhammer Defenses
Daniel Gruss
Moritz Lipp
Michael Schwarz
Daniel Genkin
Jonas Juffinger
Sioli O'Connell
Wolfgang Schoechl
Y. Yarom
59
250
0
02 Oct 2017
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P. Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
56
453
0
27 Nov 2015
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Daniel Gruss
Clémentine Maurice
Stefan Mangard
52
418
0
24 Jul 2015
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
Yossef Oren
V. Kemerlis
S. Sethumadhavan
A. Keromytis
72
330
0
25 Feb 2015
1