BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN
CALSCALE:GREGORIAN
VERSION:2.0
BEGIN:VTIMEZONE
TZID;X-RICAL-TZSOURCE=TZINFO:Europe/Berlin
BEGIN:STANDARD
DTSTART:20151025T030000
RDATE:20151025T030000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTEND;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T184500
DTSTART;TZID=Europe/Berlin;VALUE=DATE-TIME:20151228T181500
DTSTAMP;VALUE=DATE-TIME:20160107T102005Z
UID:01da121b-bd49-4805-aaaf-a6ec1f4f941f@frab.cccv.de
DESCRIPTION:"Insanity: doing the same thing over and over again and expec
 ting different results." \nAlbert Einstein - Who did not live long enoug
 h to see Rowhammer\n\nRecent studies have found that repeated accesses t
 o DRAM rows can cause random bit flips\, resulting in the so called Rowh
 ammer vulnerability. We present Rowhammer.js\, the first remote software
 -induced hardware-fault attack\, from JavaScript. We also extend our pre
 sentation with an overview of cache side-channel attacks\, that use the 
 same technique to evict data from the cache.
URL:http://events.ccc.de/congress/2015/Fahrplan/events/7197.html
SUMMARY:Rowhammer.js: Root privileges for web apps?
LOCATION:Hall 1
END:VEVENT
END:VCALENDAR
