Anna Kim[Security] How to exploit DRAM with Hammertime (๐จRowhammer attack step by step)PC security is facing a real threat. This post is aimed to practically show how the Hammertime tool can simulate Rowhammer exploit on DRAM.Feb 26, 20201Feb 26, 20201
Anna KimRowhammer ๊ณต๊ฒฉ ๋์์ ์ํ ECC ๋ฉ๋ชจ๋ฆฌ์ ํจ๊ณผ๋? Error-Correcting Code์ ์คํจ์ฑ ๊ฒ์ฆRAM์ ๋ํ ์ ๋ฐ์ ์ธ ๊ฐ์๋ฅผ ํตํด ์๋ ์ธ๊ณ 4๋ ๋ณด์ ํํ์ ์ ์ ๋ ํ๋์จ์ด&๋ณด์ ๋ ผ๋ฌธ ์ดํดํด๋ณด๊ธฐFeb 3, 20201Feb 3, 20201
Anna KimHow to use useful library STL in C++ย : Basic container, iterator and algorithmSTL is a (well-implemented) C++ standard template library for developers to be used. Developers can write application easily by using STLโฆMar 18, 2019Mar 18, 2019
Anna KimBasic C++ for DATA STRUCTURE 2 (Operator overloading, Constant member function& object, Template)Operator overloading, Constant member function, object and Template before beginning Data Structure (C++ part 2)Mar 13, 2019Mar 13, 2019
Anna KimBasic C++ for DATA STRUCTURES & PROGRAMMINGSummarizing what I learned from computer engineering major course from college and before getting into data structure, understand C++Mar 7, 20191Mar 7, 20191