Enlarge (credit: John Karakatsanis / Flickr) Over the past few years, there has been a steady evolution in Rowhammer, the once largely theoretical attack that exploits physical defects in memory chips to tamper with the security of the devices they run on. On Thursday, researchers are unveiling the most practical demonstration yet of Rowhammer's power and reach: an exploit that remotely executes malicious code on Android phones by harnessing their graphical processors. Dubbed GLitch, the exploit is the first to show that GPUs can flip individual bits stored in dynamic random-access memory.

Topics:  enlarge   john karakatsanis    flickr    dubbed glitch   gpus   javascript   glitch   webgl   ddr3   ddr4   dimms   dram   read   comments   rowhammer    glitch   compromise   android phone   memory   exploit   attackers   exploits   malicious   previous   physical   cell   

 

Welcome to Wopular!

Welcome to Wopular

Wopular is an online newspaper rack, giving you a summary view of the top headlines from the top news sites.

Senh Duong (Founder)
Wopular, MWB, RottenTomatoes

Subscribe to Wopular's RSS Fan Wopular on Facebook Follow Wopular on Twitter Follow Wopular on Google Plus

MoviesWithButter : Our Sister Site

More Business News