<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Using Rowhammer bitflips to root Android phones is now a thing &#124; Ars Technica</title>
	<atom:link href="http://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 27 Apr 2026 22:32:14 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1807613</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 12:06:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1807613</guid>
		<description><![CDATA[https://hackaday.com/2023/06/30/this-week-in-securitycamaro-dragon-rowpress-and-repojacking/

ROWPRESS
It may sound like an exercise, but RowPress is actually the latest DRAM attack, in the same vein as RowHammer. Where RowHammer repeatedly opened and closed a DRAM’s activation line to induce errors on a neighboring line, RowPress simply keeps the activation line opened longer than normal. And it works better than RowHammer, surprisingly. And because it’s a novel technique, it sidesteps a lot of the protections built for Rowhammer and other techniques.

One of the interesting observations is that the temperature of system memory makes a difference. Once RAM is over 80 degrees Celsius, most of the RAM tested became significantly more vulnerable to RowPress memory corruption. 

https://dl.acm.org/doi/abs/10.1145/3579371.3589063]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/06/30/this-week-in-securitycamaro-dragon-rowpress-and-repojacking/" rel="nofollow">https://hackaday.com/2023/06/30/this-week-in-securitycamaro-dragon-rowpress-and-repojacking/</a></p>
<p>ROWPRESS<br />
It may sound like an exercise, but RowPress is actually the latest DRAM attack, in the same vein as RowHammer. Where RowHammer repeatedly opened and closed a DRAM’s activation line to induce errors on a neighboring line, RowPress simply keeps the activation line opened longer than normal. And it works better than RowHammer, surprisingly. And because it’s a novel technique, it sidesteps a lot of the protections built for Rowhammer and other techniques.</p>
<p>One of the interesting observations is that the temperature of system memory makes a difference. Once RAM is over 80 degrees Celsius, most of the RAM tested became significantly more vulnerable to RowPress memory corruption. </p>
<p><a href="https://dl.acm.org/doi/abs/10.1145/3579371.3589063" rel="nofollow">https://dl.acm.org/doi/abs/10.1145/3579371.3589063</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1739831</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 17 Nov 2021 08:42:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1739831</guid>
		<description><![CDATA[Dan Goodin / Ars Technica:
Researchers say they used a new Rowhammer exploit to successfully flip bits on all 40 PC-DDR4 DRAM devices they tested, defeating recent hardware mitigations — Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits. — Rowhammer exploits that allow unprivileged attackers …

DDR4 memory protections are broken wide open by new Rowhammer technique
Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits.
https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/

Rowhammer exploits that allow unprivileged attackers to change or corrupt data stored in vulnerable memory chips are now possible on virtually all DDR4 modules due to a new approach that neuters defenses chip manufacturers added to make their wares more resistant to such attacks.

Rowhammer attacks work by accessing—or hammering—physical rows inside vulnerable chips millions of times per second in ways that cause bits in neighboring rows to flip, meaning 1s turn to 0s and vice versa. Researchers have shown the attacks can be used to give untrusted applications nearly unfettered system privileges, bypass security sandboxes designed to keep malicious code from accessing sensitive operating system resources, and root or infect Android devices, among other things.

All previous Rowhammer attacks have hammered rows with uniform patterns, such as single-sided, double-sided, or n-sided. In all three cases, these “aggressor” rows—meaning those that cause bitflips in nearby “victim” rows—are accessed the same number of times.

Bypassing all in-DRAM mitigations

Research published on Monday presented a new Rowhammer technique. It uses non-uniform patterns that access two or more aggressor rows with different frequencies. The result: all 40 of the randomly selected DIMMs in a test pool experienced bitflips, up from 13 out of 42 chips tested in previous work from the same researchers.

“We found that by creating special memory access patterns we can bypass all mitigations that are deployed inside DRAM,” Kaveh Razavi and Patrick Jattke, two of the research authors, wrote in an email. “This increases the number of devices that can potentially be hacked with known attacks to 80 percent, according to our analysis. These issues cannot be patched due to their hardware nature and will remain with us for many years to come.”

The non-uniform patterns work against Target Row Refresh. Abbreviated as TRR, the mitigation works differently from vendor to vendor but generally tracks the number of times a row is accessed and recharges neighboring victim rows when there are signs of abuse. The neutering of this defense puts further pressure on chipmakers to mitigate a class of attacks that many people thought more recent types of memory chips were resistant to.

Blacksmith
https://comsec.ethz.ch/research/dram/blacksmith/

We demonstrate that it is possible to trigger Rowhammer bit flips on all DRAM devices today despite deployed mitigations on commodity off-the-shelf systems with little effort. This result has a significant impact on the system’s security as DRAM devices in the wild cannot easily be fixed, and previous work showed real-world Rowhammer attacks are practical, for example, in the browser using JavaScript, on smartphones, across VMs in the cloud, and even over the network.

Rowhammer is a vulnerability caused by leaking charges in DRAM cells that enables attackers to induce bit flips in DRAM memory. To stop Rowhammer, DRAM implements a mitigation known as Target Row Refresh (TRR). Our previous work showed that the new n-sided patterns can still trigger bit flips on 31% of today’s PC-DDR4 devices. We propose a new highly effective approach for crafting non-uniform and frequency-based Rowhammer access patterns that can bypass TRR from standard PCs. We implement these patterns in our Rowhammer fuzzer named Blacksmith and show that it can bypass TRR on 100% of the PC-DDR4 DRAM devices in our test pool. Further, our work provides new insights on the deployed mitigations.

How bad is it?

For our evaluation, we considered a test pool of 40 DDR4 devices covering the three major manufacturers (Samsung, Micron, SK Hynix), including 4 devices that did not report their manufacturer. We let our Blacksmith fuzzer run for 12 hours to assess its capability to find effective patterns. Thereafter, we swept the best pattern (based on the number of total bit flips triggered) over a contiguous memory area of 256 MB and report the number of bit flips. The results in Table 1 show that our Blacksmith fuzzer is able to trigger bit flips on all 40 DRAM devices with a large number of bit flips, especially on devices of manufacturers A and D.

We also evaluated the exploitability of these bit flips based on three attacks from previous work: an attack targeting the page frame number of a page table entry (PTE) to pivot it to an attacker-controlled page table page, an attack on the RSA-2048 public key that allows recovering the associated private key used to authenticate to an SSH host, and an attack on the password verification logic of the sudoers.so library that enables gaining root privileges.

You can a demo of our Blacksmith fuzzer below, showing how easy and quick it is to find bit flips on TRR-enabled DDR4 devices.

BLACKSMITH: Scalable Rowhammering in the Frequency Domain
https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
Researchers say they used a new Rowhammer exploit to successfully flip bits on all 40 PC-DDR4 DRAM devices they tested, defeating recent hardware mitigations — Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits. — Rowhammer exploits that allow unprivileged attackers …</p>
<p>DDR4 memory protections are broken wide open by new Rowhammer technique<br />
Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits.<br />
<a href="https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/" rel="nofollow">https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/</a></p>
<p>Rowhammer exploits that allow unprivileged attackers to change or corrupt data stored in vulnerable memory chips are now possible on virtually all DDR4 modules due to a new approach that neuters defenses chip manufacturers added to make their wares more resistant to such attacks.</p>
<p>Rowhammer attacks work by accessing—or hammering—physical rows inside vulnerable chips millions of times per second in ways that cause bits in neighboring rows to flip, meaning 1s turn to 0s and vice versa. Researchers have shown the attacks can be used to give untrusted applications nearly unfettered system privileges, bypass security sandboxes designed to keep malicious code from accessing sensitive operating system resources, and root or infect Android devices, among other things.</p>
<p>All previous Rowhammer attacks have hammered rows with uniform patterns, such as single-sided, double-sided, or n-sided. In all three cases, these “aggressor” rows—meaning those that cause bitflips in nearby “victim” rows—are accessed the same number of times.</p>
<p>Bypassing all in-DRAM mitigations</p>
<p>Research published on Monday presented a new Rowhammer technique. It uses non-uniform patterns that access two or more aggressor rows with different frequencies. The result: all 40 of the randomly selected DIMMs in a test pool experienced bitflips, up from 13 out of 42 chips tested in previous work from the same researchers.</p>
<p>“We found that by creating special memory access patterns we can bypass all mitigations that are deployed inside DRAM,” Kaveh Razavi and Patrick Jattke, two of the research authors, wrote in an email. “This increases the number of devices that can potentially be hacked with known attacks to 80 percent, according to our analysis. These issues cannot be patched due to their hardware nature and will remain with us for many years to come.”</p>
<p>The non-uniform patterns work against Target Row Refresh. Abbreviated as TRR, the mitigation works differently from vendor to vendor but generally tracks the number of times a row is accessed and recharges neighboring victim rows when there are signs of abuse. The neutering of this defense puts further pressure on chipmakers to mitigate a class of attacks that many people thought more recent types of memory chips were resistant to.</p>
<p>Blacksmith<br />
<a href="https://comsec.ethz.ch/research/dram/blacksmith/" rel="nofollow">https://comsec.ethz.ch/research/dram/blacksmith/</a></p>
<p>We demonstrate that it is possible to trigger Rowhammer bit flips on all DRAM devices today despite deployed mitigations on commodity off-the-shelf systems with little effort. This result has a significant impact on the system’s security as DRAM devices in the wild cannot easily be fixed, and previous work showed real-world Rowhammer attacks are practical, for example, in the browser using JavaScript, on smartphones, across VMs in the cloud, and even over the network.</p>
<p>Rowhammer is a vulnerability caused by leaking charges in DRAM cells that enables attackers to induce bit flips in DRAM memory. To stop Rowhammer, DRAM implements a mitigation known as Target Row Refresh (TRR). Our previous work showed that the new n-sided patterns can still trigger bit flips on 31% of today’s PC-DDR4 devices. We propose a new highly effective approach for crafting non-uniform and frequency-based Rowhammer access patterns that can bypass TRR from standard PCs. We implement these patterns in our Rowhammer fuzzer named Blacksmith and show that it can bypass TRR on 100% of the PC-DDR4 DRAM devices in our test pool. Further, our work provides new insights on the deployed mitigations.</p>
<p>How bad is it?</p>
<p>For our evaluation, we considered a test pool of 40 DDR4 devices covering the three major manufacturers (Samsung, Micron, SK Hynix), including 4 devices that did not report their manufacturer. We let our Blacksmith fuzzer run for 12 hours to assess its capability to find effective patterns. Thereafter, we swept the best pattern (based on the number of total bit flips triggered) over a contiguous memory area of 256 MB and report the number of bit flips. The results in Table 1 show that our Blacksmith fuzzer is able to trigger bit flips on all 40 DRAM devices with a large number of bit flips, especially on devices of manufacturers A and D.</p>
<p>We also evaluated the exploitability of these bit flips based on three attacks from previous work: an attack targeting the page frame number of a page table entry (PTE) to pivot it to an attacker-controlled page table page, an attack on the RSA-2048 public key that allows recovering the associated private key used to authenticate to an SSH host, and an attack on the password verification logic of the sudoers.so library that enables gaining root privileges.</p>
<p>You can a demo of our Blacksmith fuzzer below, showing how easy and quick it is to find bit flips on TRR-enabled DDR4 devices.</p>
<p>BLACKSMITH: Scalable Rowhammering in the Frequency Domain<br />
<a href="https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf" rel="nofollow">https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1739830</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 17 Nov 2021 08:42:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1739830</guid>
		<description><![CDATA[Blacksmith: Rowhammer Fuzzer Bypasses Existing Protections
https://www.securityweek.com/blacksmith-rowhammer-fuzzer-bypasses-existing-protections

A group of security researchers devised a new attack that completely bypasses the existing mitigations against the Rowhammer vulnerability in dynamic random-access memory (DRAM) chips.

The Rowhammer issue, which has been around for roughly one decade, exists because cells on DRAM chips are smaller and closer to each other, making it difficult to prevent electrical interaction between them. Thus, by repeatedly accessing data in a row of memory, data in nearby rows may become corrupted.

To mitigate the flaw, Target Row Refresh (TRR) was introduced in DRAM but a group of researchers managed to bypass the protection using “non-uniform and frequency-based Rowhammer access patterns.”

All Rowhammer access patterns published to date exploit rows uniformly, and TRR exploits this behavior to identify ‘aggressor’ rows and refresh nearby ‘victim’ rows to prevent failure.

However, as smaller technology nodes are used, the underlying DRAM technologies are increasingly vulnerable, resulting in fewer accesses being needed to trigger bit flips in DRAM memory. Thus, non-uniform access patterns can be used to bypass TRR, the researchers said in a paper documenting the work.

The researchers conducted experiments on 40 DDR4 DIMMs (from Samsung, Micron, and SK Hynix) to explore the possibility of bypassing mitigations through “accessing aggressor rows in non-uniform access patterns.”

BLACKSMITH: Scalable Rowhammering in the Frequency Domain
https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf]]></description>
		<content:encoded><![CDATA[<p>Blacksmith: Rowhammer Fuzzer Bypasses Existing Protections<br />
<a href="https://www.securityweek.com/blacksmith-rowhammer-fuzzer-bypasses-existing-protections" rel="nofollow">https://www.securityweek.com/blacksmith-rowhammer-fuzzer-bypasses-existing-protections</a></p>
<p>A group of security researchers devised a new attack that completely bypasses the existing mitigations against the Rowhammer vulnerability in dynamic random-access memory (DRAM) chips.</p>
<p>The Rowhammer issue, which has been around for roughly one decade, exists because cells on DRAM chips are smaller and closer to each other, making it difficult to prevent electrical interaction between them. Thus, by repeatedly accessing data in a row of memory, data in nearby rows may become corrupted.</p>
<p>To mitigate the flaw, Target Row Refresh (TRR) was introduced in DRAM but a group of researchers managed to bypass the protection using “non-uniform and frequency-based Rowhammer access patterns.”</p>
<p>All Rowhammer access patterns published to date exploit rows uniformly, and TRR exploits this behavior to identify ‘aggressor’ rows and refresh nearby ‘victim’ rows to prevent failure.</p>
<p>However, as smaller technology nodes are used, the underlying DRAM technologies are increasingly vulnerable, resulting in fewer accesses being needed to trigger bit flips in DRAM memory. Thus, non-uniform access patterns can be used to bypass TRR, the researchers said in a paper documenting the work.</p>
<p>The researchers conducted experiments on 40 DDR4 DIMMs (from Samsung, Micron, and SK Hynix) to explore the possibility of bypassing mitigations through “accessing aggressor rows in non-uniform access patterns.”</p>
<p>BLACKSMITH: Scalable Rowhammering in the Frequency Domain<br />
<a href="https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf" rel="nofollow">https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1714624</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 May 2021 07:33:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1714624</guid>
		<description><![CDATA[Lily Hay Newman / Wired: 	
Google researchers detail “Half-Double”, a new Rowhammer attack technique they say will be difficult to mitigate as future generations of DRAM chips get smaller

As Chips Shrink, Rowhammer Attacks Get Harder to Stop
A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed.
https://www.wired.com/story/rowhammer-half-double-attack-bit-flips/

In 2015, Researchers at Google made a troubling discovery: The data theft technique known as “Rowhammer,” previously thought of as a theoretical concern, could be exploited in real-world conditions. Now a different group of Google computer scientists have shown that the problem has only gotten worse, thanks in part to improvements in how chips are designed.

Rowhammer is a physical hacking technique that manipulates the electric charge in computer memory chips (known as DRAM) to corrupt or exfiltrate data. In an attack, hackers run the same program repeatedly on a &quot;row&quot; of DRAM transistors to &quot;hammer&quot; that row until it leaks electricity into the adjacent row. When done in a targeted way, that leakage can physically flip a bit in the next row of transistors from 1 to 0 or vice versa. By strategically flipping enough bits, an attacker can begin to manipulate the target system and gain a digital foothold. 

In the years since the original 2014 Rowhammer research, chipmakers have added mitigations that monitor adjacent rows for potentially suspicious behavior. But as chips continue to get smaller, the ripple effect that comes from hammering a given row could potentially flip bits two or more rows away.

Think of Gallagher smashing a watermelon. You can protect the front of the audience by giving them all plastic ponchos. But if he swings hard enough, and the crowd is packed in tight enough, the rind and pulp could make contact with faces two or three rows deep.

The researchers dubbed their attack “Half-Double,” and note that the technique wasn&#039;t practical on older generations of DRAM where transistor rows were slightly farther apart. As whatever&#039;s left of Moore&#039;s Law packs transistors ever more densely together, though, the risk of spillover in Rowhammer attacks is increasing.

“This is the result of miniaturization,” the Google researchers told WIRED in a written response to questions. “In our experiments with older DDR4 chips, this technique was not successful. We are releasing this research today in order to advance the understanding of this threat. We are hopeful that it will further discussions on mitigations that are long lasting and effective.”

Google disclosed its findings to the semiconductor engineering trade organization JEDEC, which has issued two stop-gap mitigations. And the researchers have been coordinating with other industry partners as well to raise awareness about the issue. But it will take time for chipmakers to fully understand the implications.

A full fix will also require rethinking how chips get designed, and would apply to future generations of DRAM. To go back Mighimi&#039;s metaphor, it&#039;s easier to build a new apartment with thicker walls and more insulation than it is to retrofit an existing building.

Moghimi says that researchers already understood this potential risk in theory, but that the Google findings, once again, demonstrate a plausible, real-world attack. “It shows that it&#039;s more practical than a lot of people think,” he says.

This isn&#039;t the first time Rowhammer attacks have seemed to be resolved and then roared back. Researchers at Vrije Universiteit Amsterdam have repeatedly shown in the last 18 months that current chip defenses against more traditional Rowhammer attacks can be defeated. But the Google findings carry an additional warning that advances in the size and efficiency of memory chips potentially come with new risks from Rowhammer.


NEAR-TERM DRAM LEVEL ROWHAMMER MITIGATION
https://www.jedec.org/standards-documents/docs/jep300-1

SYSTEM LEVEL ROWHAMMER MITIGATION
https://www.jedec.org/standards-documents/docs/jep301-1]]></description>
		<content:encoded><![CDATA[<p>Lily Hay Newman / Wired:<br />
Google researchers detail “Half-Double”, a new Rowhammer attack technique they say will be difficult to mitigate as future generations of DRAM chips get smaller</p>
<p>As Chips Shrink, Rowhammer Attacks Get Harder to Stop<br />
A full fix for the “Half-Double” technique will require rethinking how memory semiconductors are designed.<br />
<a href="https://www.wired.com/story/rowhammer-half-double-attack-bit-flips/" rel="nofollow">https://www.wired.com/story/rowhammer-half-double-attack-bit-flips/</a></p>
<p>In 2015, Researchers at Google made a troubling discovery: The data theft technique known as “Rowhammer,” previously thought of as a theoretical concern, could be exploited in real-world conditions. Now a different group of Google computer scientists have shown that the problem has only gotten worse, thanks in part to improvements in how chips are designed.</p>
<p>Rowhammer is a physical hacking technique that manipulates the electric charge in computer memory chips (known as DRAM) to corrupt or exfiltrate data. In an attack, hackers run the same program repeatedly on a &#8220;row&#8221; of DRAM transistors to &#8220;hammer&#8221; that row until it leaks electricity into the adjacent row. When done in a targeted way, that leakage can physically flip a bit in the next row of transistors from 1 to 0 or vice versa. By strategically flipping enough bits, an attacker can begin to manipulate the target system and gain a digital foothold. </p>
<p>In the years since the original 2014 Rowhammer research, chipmakers have added mitigations that monitor adjacent rows for potentially suspicious behavior. But as chips continue to get smaller, the ripple effect that comes from hammering a given row could potentially flip bits two or more rows away.</p>
<p>Think of Gallagher smashing a watermelon. You can protect the front of the audience by giving them all plastic ponchos. But if he swings hard enough, and the crowd is packed in tight enough, the rind and pulp could make contact with faces two or three rows deep.</p>
<p>The researchers dubbed their attack “Half-Double,” and note that the technique wasn&#8217;t practical on older generations of DRAM where transistor rows were slightly farther apart. As whatever&#8217;s left of Moore&#8217;s Law packs transistors ever more densely together, though, the risk of spillover in Rowhammer attacks is increasing.</p>
<p>“This is the result of miniaturization,” the Google researchers told WIRED in a written response to questions. “In our experiments with older DDR4 chips, this technique was not successful. We are releasing this research today in order to advance the understanding of this threat. We are hopeful that it will further discussions on mitigations that are long lasting and effective.”</p>
<p>Google disclosed its findings to the semiconductor engineering trade organization JEDEC, which has issued two stop-gap mitigations. And the researchers have been coordinating with other industry partners as well to raise awareness about the issue. But it will take time for chipmakers to fully understand the implications.</p>
<p>A full fix will also require rethinking how chips get designed, and would apply to future generations of DRAM. To go back Mighimi&#8217;s metaphor, it&#8217;s easier to build a new apartment with thicker walls and more insulation than it is to retrofit an existing building.</p>
<p>Moghimi says that researchers already understood this potential risk in theory, but that the Google findings, once again, demonstrate a plausible, real-world attack. “It shows that it&#8217;s more practical than a lot of people think,” he says.</p>
<p>This isn&#8217;t the first time Rowhammer attacks have seemed to be resolved and then roared back. Researchers at Vrije Universiteit Amsterdam have repeatedly shown in the last 18 months that current chip defenses against more traditional Rowhammer attacks can be defeated. But the Google findings carry an additional warning that advances in the size and efficiency of memory chips potentially come with new risks from Rowhammer.</p>
<p>NEAR-TERM DRAM LEVEL ROWHAMMER MITIGATION<br />
<a href="https://www.jedec.org/standards-documents/docs/jep300-1" rel="nofollow">https://www.jedec.org/standards-documents/docs/jep300-1</a></p>
<p>SYSTEM LEVEL ROWHAMMER MITIGATION<br />
<a href="https://www.jedec.org/standards-documents/docs/jep301-1" rel="nofollow">https://www.jedec.org/standards-documents/docs/jep301-1</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1714038</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 27 May 2021 12:25:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1714038</guid>
		<description><![CDATA[https://github.com/google/hammer-kit/blob/main/20210525_half_double.pdf]]></description>
		<content:encoded><![CDATA[<p><a href="https://github.com/google/hammer-kit/blob/main/20210525_half_double.pdf" rel="nofollow">https://github.com/google/hammer-kit/blob/main/20210525_half_double.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1713165</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 May 2021 07:26:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1713165</guid>
		<description><![CDATA[New hammering technique for DRAM Rowhammer bug https://security.googleblog.com/2021/05/introducing-half-double-new-hammering.html
Half-Double, a new Rowhammer technique that capitalizes on the worsening physics of some of the newer DRAM chips to alter the contents of memory.]]></description>
		<content:encoded><![CDATA[<p>New hammering technique for DRAM Rowhammer bug <a href="https://security.googleblog.com/2021/05/introducing-half-double-new-hammering.html" rel="nofollow">https://security.googleblog.com/2021/05/introducing-half-double-new-hammering.html</a><br />
Half-Double, a new Rowhammer technique that capitalizes on the worsening physics of some of the newer DRAM chips to alter the contents of memory.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1708984</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 24 Apr 2021 17:33:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1708984</guid>
		<description><![CDATA[New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks
https://thehackernews.com/2021/04/new-javascript-exploit-can-now-carry.html

Academics from Vrije University in Amsterdam and ETH Zurich have published a new research paper describing yet another variation of the Rowhammer attack.

Dubbed SMASH (Synchronized MAny-Sided Hammering), the technique can be used to successfully trigger the attack from JavaScript on modern DDR4 RAM cards, notwithstanding extensive mitigations that have been put in place by manufacturers over the last seven years.

https://www.vusec.net/projects/smash/]]></description>
		<content:encoded><![CDATA[<p>New JavaScript Exploit Can Now Carry Out DDR4 Rowhammer Attacks<br />
<a href="https://thehackernews.com/2021/04/new-javascript-exploit-can-now-carry.html" rel="nofollow">https://thehackernews.com/2021/04/new-javascript-exploit-can-now-carry.html</a></p>
<p>Academics from Vrije University in Amsterdam and ETH Zurich have published a new research paper describing yet another variation of the Rowhammer attack.</p>
<p>Dubbed SMASH (Synchronized MAny-Sided Hammering), the technique can be used to successfully trigger the attack from JavaScript on modern DDR4 RAM cards, notwithstanding extensive mitigations that have been put in place by manufacturers over the last seven years.</p>
<p><a href="https://www.vusec.net/projects/smash/" rel="nofollow">https://www.vusec.net/projects/smash/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1703715</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 10:00:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1703715</guid>
		<description><![CDATA[DRAM’s Persistent Threat To Chip Security
https://semiengineering.com/drams-peristent-threat-to-chip-security/

Rowhammer attack on memory could create significant issues for systems; possible solution emerges.]]></description>
		<content:encoded><![CDATA[<p>DRAM’s Persistent Threat To Chip Security<br />
<a href="https://semiengineering.com/drams-peristent-threat-to-chip-security/" rel="nofollow">https://semiengineering.com/drams-peristent-threat-to-chip-security/</a></p>
<p>Rowhammer attack on memory could create significant issues for systems; possible solution emerges.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1672745</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 12 Mar 2020 08:15:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1672745</guid>
		<description><![CDATA[DDR4 Memory Still At Rowhammer Risk, New Method Bypasses Fixes
https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/
Academic researchers testing modern memory modules from Samsung,
Micron, and Hynix discovered that current protections against
Rowhammer attacks are insufficient.. The new findings show that memory
bit flipping works on many devices, including popular smartphones from
Google, Samsung, and OnePlus.]]></description>
		<content:encoded><![CDATA[<p>DDR4 Memory Still At Rowhammer Risk, New Method Bypasses Fixes<br />
<a href="https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/" rel="nofollow">https://www.bleepingcomputer.com/news/security/ddr4-memory-still-at-rowhammer-risk-new-method-bypasses-fixes/</a><br />
Academic researchers testing modern memory modules from Samsung,<br />
Micron, and Hynix discovered that current protections against<br />
Rowhammer attacks are insufficient.. The new findings show that memory<br />
bit flipping works on many devices, including popular smartphones from<br />
Google, Samsung, and OnePlus.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/10/24/using-rowhammer-bitflips-to-root-android-phones-is-now-a-thing-ars-technica/comment-page-1/#comment-1622950</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 27 Jan 2019 10:10:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=48440#comment-1622950</guid>
		<description><![CDATA[Winter is Coming Back: Defeating the Most Advanced Rowhammer Defenses to Gain Root and Kernel Privileges
https://www.blackhat.com/asia-19/briefings/schedule/index.html#winter-is-coming-back-defeating-the-most-advanced-rowhammer-defenses-to-gain-root-and-kernel-privileges-13524]]></description>
		<content:encoded><![CDATA[<p>Winter is Coming Back: Defeating the Most Advanced Rowhammer Defenses to Gain Root and Kernel Privileges<br />
<a href="https://www.blackhat.com/asia-19/briefings/schedule/index.html#winter-is-coming-back-defeating-the-most-advanced-rowhammer-defenses-to-gain-root-and-kernel-privileges-13524" rel="nofollow">https://www.blackhat.com/asia-19/briefings/schedule/index.html#winter-is-coming-back-defeating-the-most-advanced-rowhammer-defenses-to-gain-root-and-kernel-privileges-13524</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
