Three new attacks demonstrate how a malicious user can gain full root control of a host machine by performing novel Rowhammer ...