Motivation
The discussions of the problems mentioned in the previous Section necessitate the fact that further exploration of RH is required, and to launch a deterministic RH attack on the main memory, the following prerequisites must be satisfied.
Determine the DRAM address mapping of the device.
Discover strategies for rapidly activating rows to induce bit flips.
Identify victim and aggressor rows, along with significant RH parameters influencing bit flips.
Conduct RH repeatability tests to demonstrate error recurrence.
Determine how attackers access the physical address of the identified aggressor row from userland.
Exploit the vulnerability by placing security-sensitive data into identified victim rows.