Exploiting Rowhammer Vulnerabilities to Corrupt Register and Stack Variables in Critical Applications
Rowhammer attacks can be used to inject faults into stack variables and even CPU register values, enabling bypass of security checks and authentication mechanisms in critical applications.