We present an experimental study showing that soft … Our attack works by sending to the JVM … will allow it to take control of the … The technique … is broadly applicable against other language-based security schemes … We show that a single-bit error … can be exploited to execute arbitrary code with … we have successfully used heat [to generate memory errors]. Fortunately, there … [e.g., error-correcting memory and log of memory errors]
Google-1
Google-2
Copyright clearance needed for quotation.