A team of researchers has proposed two software-based methods that could be used to mitigate Rowhammer, a type of attack that exploits weaknesses in the design of dynamic random-access memory (DRAM).
from SecurityWeek RSS Feed http://ift.tt/2gPLPvj
via https://ifttt.com/ IFTTT
No comments:
Post a Comment