Rowhammer Instruction Skip Attack: Bypassing Security Checks and Encryption in Real-World Applications
The LeapFrog attack leverages Rowhammer-induced bit flips in the Program Counter (PC) value stored in the stack to subvert the control flow of victim processes, enabling the bypass of security-critical code sections such as authentication checks and encryption routines.