The LeapFrog attack leverages Rowhammer-induced bit flips in the Program Counter (PC) value stored in the stack to subvert the control flow of victim processes, enabling the bypass of security-critical code sections such as authentication checks and encryption routines.
A novel covert channel attack that exploits the duty cycle modulation feature of modern Intel processors to enable secret communication between two colluding processes, bypassing security policies.
Preventing reverse engineering through hardware FSM honeypots and unattractive FSMs.