<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: RAMBleed vulnerability</title>
	<atom:link href="http://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 21:24:25 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/comment-page-1/#comment-1862316</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 21 Sep 2025 13:26:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182761#comment-1862316</guid>
		<description><![CDATA[Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack
Google and ETH Zurich found problems with AMD/SK Hynix combo, will probe other hardware
https://www.theregister.com/2025/09/17/ddr5_dram_rowhammer/]]></description>
		<content:encoded><![CDATA[<p>Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack<br />
Google and ETH Zurich found problems with AMD/SK Hynix combo, will probe other hardware<br />
<a href="https://www.theregister.com/2025/09/17/ddr5_dram_rowhammer/" rel="nofollow">https://www.theregister.com/2025/09/17/ddr5_dram_rowhammer/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/comment-page-1/#comment-1739832</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 17 Nov 2021 08:42:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182761#comment-1739832</guid>
		<description><![CDATA[Blacksmith: Rowhammer Fuzzer Bypasses Existing Protections
https://www.securityweek.com/blacksmith-rowhammer-fuzzer-bypasses-existing-protections

A group of security researchers devised a new attack that completely bypasses the existing mitigations against the Rowhammer vulnerability in dynamic random-access memory (DRAM) chips.

The Rowhammer issue, which has been around for roughly one decade, exists because cells on DRAM chips are smaller and closer to each other, making it difficult to prevent electrical interaction between them. Thus, by repeatedly accessing data in a row of memory, data in nearby rows may become corrupted.

To mitigate the flaw, Target Row Refresh (TRR) was introduced in DRAM but a group of researchers managed to bypass the protection using “non-uniform and frequency-based Rowhammer access patterns.”

All Rowhammer access patterns published to date exploit rows uniformly, and TRR exploits this behavior to identify ‘aggressor’ rows and refresh nearby ‘victim’ rows to prevent failure.

However, as smaller technology nodes are used, the underlying DRAM technologies are increasingly vulnerable, resulting in fewer accesses being needed to trigger bit flips in DRAM memory. Thus, non-uniform access patterns can be used to bypass TRR, the researchers said in a paper documenting the work.

The researchers conducted experiments on 40 DDR4 DIMMs (from Samsung, Micron, and SK Hynix) to explore the possibility of bypassing mitigations through “accessing aggressor rows in non-uniform access patterns.”

BLACKSMITH: Scalable Rowhammering in the Frequency Domain
https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf]]></description>
		<content:encoded><![CDATA[<p>Blacksmith: Rowhammer Fuzzer Bypasses Existing Protections<br />
<a href="https://www.securityweek.com/blacksmith-rowhammer-fuzzer-bypasses-existing-protections" rel="nofollow">https://www.securityweek.com/blacksmith-rowhammer-fuzzer-bypasses-existing-protections</a></p>
<p>A group of security researchers devised a new attack that completely bypasses the existing mitigations against the Rowhammer vulnerability in dynamic random-access memory (DRAM) chips.</p>
<p>The Rowhammer issue, which has been around for roughly one decade, exists because cells on DRAM chips are smaller and closer to each other, making it difficult to prevent electrical interaction between them. Thus, by repeatedly accessing data in a row of memory, data in nearby rows may become corrupted.</p>
<p>To mitigate the flaw, Target Row Refresh (TRR) was introduced in DRAM but a group of researchers managed to bypass the protection using “non-uniform and frequency-based Rowhammer access patterns.”</p>
<p>All Rowhammer access patterns published to date exploit rows uniformly, and TRR exploits this behavior to identify ‘aggressor’ rows and refresh nearby ‘victim’ rows to prevent failure.</p>
<p>However, as smaller technology nodes are used, the underlying DRAM technologies are increasingly vulnerable, resulting in fewer accesses being needed to trigger bit flips in DRAM memory. Thus, non-uniform access patterns can be used to bypass TRR, the researchers said in a paper documenting the work.</p>
<p>The researchers conducted experiments on 40 DDR4 DIMMs (from Samsung, Micron, and SK Hynix) to explore the possibility of bypassing mitigations through “accessing aggressor rows in non-uniform access patterns.”</p>
<p>BLACKSMITH: Scalable Rowhammering in the Frequency Domain<br />
<a href="https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf" rel="nofollow">https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/comment-page-1/#comment-1739608</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Nov 2021 11:50:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182761#comment-1739608</guid>
		<description><![CDATA[Dan Goodin / Ars Technica: 	  
Researchers say they used a new Rowhammer exploit to successfully flip bits on all 40 PC-DDR4 DRAM devices they tested, defeating recent hardware mitigations  —  Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits.  —  Rowhammer exploits that allow unprivileged attackers … 

DDR4 memory protections are broken wide open by new Rowhammer technique
Researchers build &quot;fuzzer&quot; that supercharges potentially serious bitflipping exploits.
https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/

Rowhammer exploits that allow unprivileged attackers to change or corrupt data stored in vulnerable memory chips are now possible on virtually all DDR4 modules due to a new approach that neuters defenses chip manufacturers added to make their wares more resistant to such attacks.

Rowhammer attacks work by accessing—or hammering—physical rows inside vulnerable chips millions of times per second in ways that cause bits in neighboring rows to flip, meaning 1s turn to 0s and vice versa. Researchers have shown the attacks can be used to give untrusted applications nearly unfettered system privileges, bypass security sandboxes designed to keep malicious code from accessing sensitive operating system resources, and root or infect Android devices, among other things.

All previous Rowhammer attacks have hammered rows with uniform patterns, such as single-sided, double-sided, or n-sided. In all three cases, these “aggressor” rows—meaning those that cause bitflips in nearby “victim” rows—are accessed the same number of times.

Bypassing all in-DRAM mitigations

Research published on Monday presented a new Rowhammer technique. It uses non-uniform patterns that access two or more aggressor rows with different frequencies. The result: all 40 of the randomly selected DIMMs in a test pool experienced bitflips, up from 13 out of 42 chips tested in previous work from the same researchers.

“We found that by creating special memory access patterns we can bypass all mitigations that are deployed inside DRAM,” Kaveh Razavi and Patrick Jattke, two of the research authors, wrote in an email. “This increases the number of devices that can potentially be hacked with known attacks to 80 percent, according to our analysis. These issues cannot be patched due to their hardware nature and will remain with us for many years to come.”

The non-uniform patterns work against Target Row Refresh. Abbreviated as TRR, the mitigation works differently from vendor to vendor but generally tracks the number of times a row is accessed and recharges neighboring victim rows when there are signs of abuse. The neutering of this defense puts further pressure on chipmakers to mitigate a class of attacks that many people thought more recent types of memory chips were resistant to.


Blacksmith
https://comsec.ethz.ch/research/dram/blacksmith/

We demonstrate that it is possible to trigger Rowhammer bit flips on all DRAM devices today despite deployed mitigations on commodity off-the-shelf systems with little effort. This result has a significant impact on the system’s security as DRAM devices in the wild cannot easily be fixed, and previous work showed real-world Rowhammer attacks are practical, for example, in the browser using JavaScript, on smartphones, across VMs in the cloud, and even over the network.

Rowhammer is a vulnerability caused by leaking charges in DRAM cells that enables attackers to induce bit flips in DRAM memory. To stop Rowhammer, DRAM implements a mitigation known as Target Row Refresh (TRR). Our previous work showed that the new n-sided patterns can still trigger bit flips on 31% of today’s PC-DDR4 devices. We propose a new highly effective approach for crafting non-uniform and frequency-based Rowhammer access patterns that can bypass TRR from standard PCs. We implement these patterns in our Rowhammer fuzzer named Blacksmith and show that it can bypass TRR on 100% of the PC-DDR4 DRAM devices in our test pool. Further, our work provides new insights on the deployed mitigations.

How bad is it?

For our evaluation, we considered a test pool of 40 DDR4 devices covering the three major manufacturers (Samsung, Micron, SK Hynix), including 4 devices that did not report their manufacturer. We let our Blacksmith fuzzer run for 12 hours to assess its capability to find effective patterns. Thereafter, we swept the best pattern (based on the number of total bit flips triggered) over a contiguous memory area of 256 MB and report the number of bit flips. The results in Table 1 show that our Blacksmith fuzzer is able to trigger bit flips on all 40 DRAM devices with a large number of bit flips, especially on devices of manufacturers A and D.

We also evaluated the exploitability of these bit flips based on three attacks from previous work: an attack targeting the page frame number of a page table entry (PTE) to pivot it to an attacker-controlled page table page, an attack on the RSA-2048 public key that allows recovering the associated private key used to authenticate to an SSH host, and an attack on the password verification logic of the sudoers.so library that enables gaining root privileges.

You can a demo of our Blacksmith fuzzer below, showing how easy and quick it is to find bit flips on TRR-enabled DDR4 devices. 

BLACKSMITH: Scalable Rowhammering in the Frequency Domain
https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
Researchers say they used a new Rowhammer exploit to successfully flip bits on all 40 PC-DDR4 DRAM devices they tested, defeating recent hardware mitigations  —  Researchers build “fuzzer” that supercharges potentially serious bitflipping exploits.  —  Rowhammer exploits that allow unprivileged attackers … </p>
<p>DDR4 memory protections are broken wide open by new Rowhammer technique<br />
Researchers build &#8220;fuzzer&#8221; that supercharges potentially serious bitflipping exploits.<br />
<a href="https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/" rel="nofollow">https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/</a></p>
<p>Rowhammer exploits that allow unprivileged attackers to change or corrupt data stored in vulnerable memory chips are now possible on virtually all DDR4 modules due to a new approach that neuters defenses chip manufacturers added to make their wares more resistant to such attacks.</p>
<p>Rowhammer attacks work by accessing—or hammering—physical rows inside vulnerable chips millions of times per second in ways that cause bits in neighboring rows to flip, meaning 1s turn to 0s and vice versa. Researchers have shown the attacks can be used to give untrusted applications nearly unfettered system privileges, bypass security sandboxes designed to keep malicious code from accessing sensitive operating system resources, and root or infect Android devices, among other things.</p>
<p>All previous Rowhammer attacks have hammered rows with uniform patterns, such as single-sided, double-sided, or n-sided. In all three cases, these “aggressor” rows—meaning those that cause bitflips in nearby “victim” rows—are accessed the same number of times.</p>
<p>Bypassing all in-DRAM mitigations</p>
<p>Research published on Monday presented a new Rowhammer technique. It uses non-uniform patterns that access two or more aggressor rows with different frequencies. The result: all 40 of the randomly selected DIMMs in a test pool experienced bitflips, up from 13 out of 42 chips tested in previous work from the same researchers.</p>
<p>“We found that by creating special memory access patterns we can bypass all mitigations that are deployed inside DRAM,” Kaveh Razavi and Patrick Jattke, two of the research authors, wrote in an email. “This increases the number of devices that can potentially be hacked with known attacks to 80 percent, according to our analysis. These issues cannot be patched due to their hardware nature and will remain with us for many years to come.”</p>
<p>The non-uniform patterns work against Target Row Refresh. Abbreviated as TRR, the mitigation works differently from vendor to vendor but generally tracks the number of times a row is accessed and recharges neighboring victim rows when there are signs of abuse. The neutering of this defense puts further pressure on chipmakers to mitigate a class of attacks that many people thought more recent types of memory chips were resistant to.</p>
<p>Blacksmith<br />
<a href="https://comsec.ethz.ch/research/dram/blacksmith/" rel="nofollow">https://comsec.ethz.ch/research/dram/blacksmith/</a></p>
<p>We demonstrate that it is possible to trigger Rowhammer bit flips on all DRAM devices today despite deployed mitigations on commodity off-the-shelf systems with little effort. This result has a significant impact on the system’s security as DRAM devices in the wild cannot easily be fixed, and previous work showed real-world Rowhammer attacks are practical, for example, in the browser using JavaScript, on smartphones, across VMs in the cloud, and even over the network.</p>
<p>Rowhammer is a vulnerability caused by leaking charges in DRAM cells that enables attackers to induce bit flips in DRAM memory. To stop Rowhammer, DRAM implements a mitigation known as Target Row Refresh (TRR). Our previous work showed that the new n-sided patterns can still trigger bit flips on 31% of today’s PC-DDR4 devices. We propose a new highly effective approach for crafting non-uniform and frequency-based Rowhammer access patterns that can bypass TRR from standard PCs. We implement these patterns in our Rowhammer fuzzer named Blacksmith and show that it can bypass TRR on 100% of the PC-DDR4 DRAM devices in our test pool. Further, our work provides new insights on the deployed mitigations.</p>
<p>How bad is it?</p>
<p>For our evaluation, we considered a test pool of 40 DDR4 devices covering the three major manufacturers (Samsung, Micron, SK Hynix), including 4 devices that did not report their manufacturer. We let our Blacksmith fuzzer run for 12 hours to assess its capability to find effective patterns. Thereafter, we swept the best pattern (based on the number of total bit flips triggered) over a contiguous memory area of 256 MB and report the number of bit flips. The results in Table 1 show that our Blacksmith fuzzer is able to trigger bit flips on all 40 DRAM devices with a large number of bit flips, especially on devices of manufacturers A and D.</p>
<p>We also evaluated the exploitability of these bit flips based on three attacks from previous work: an attack targeting the page frame number of a page table entry (PTE) to pivot it to an attacker-controlled page table page, an attack on the RSA-2048 public key that allows recovering the associated private key used to authenticate to an SSH host, and an attack on the password verification logic of the sudoers.so library that enables gaining root privileges.</p>
<p>You can a demo of our Blacksmith fuzzer below, showing how easy and quick it is to find bit flips on TRR-enabled DDR4 devices. </p>
<p>BLACKSMITH: Scalable Rowhammering in the Frequency Domain<br />
<a href="https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf" rel="nofollow">https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/comment-page-1/#comment-1666874</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 07 Jan 2020 09:08:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182761#comment-1666874</guid>
		<description><![CDATA[FPGA cards can be abused for faster and more reliable Rowhammer
attacks
https://www.zdnet.com/article/fpga-cards-can-be-abused-for-faster-and-more-reliable-rowhammer-attacks/
Seeing that FPGA-CPU architectures are becoming more common, a team of
researchers from the Worcester Polytechnic Institute in the US, the
University of Lubeck in Germany, and Intel, have looked into how
Rowhammer attacks impact this new cloud setup.. Furthermore, the
academic team also found that a JackHammer attack is much more
difficult to detect because of the FPGA&#039;s direct access to system
resources leaves no traces on the CPU of the FPGA&#039;s memory access
operations. Since most anti-Rowhammer detection systems are configured
at the CPU level, this opens a new blindspot in CPU and cloud
security.]]></description>
		<content:encoded><![CDATA[<p>FPGA cards can be abused for faster and more reliable Rowhammer<br />
attacks<br />
<a href="https://www.zdnet.com/article/fpga-cards-can-be-abused-for-faster-and-more-reliable-rowhammer-attacks/" rel="nofollow">https://www.zdnet.com/article/fpga-cards-can-be-abused-for-faster-and-more-reliable-rowhammer-attacks/</a><br />
Seeing that FPGA-CPU architectures are becoming more common, a team of<br />
researchers from the Worcester Polytechnic Institute in the US, the<br />
University of Lubeck in Germany, and Intel, have looked into how<br />
Rowhammer attacks impact this new cloud setup.. Furthermore, the<br />
academic team also found that a JackHammer attack is much more<br />
difficult to detect because of the FPGA&#8217;s direct access to system<br />
resources leaves no traces on the CPU of the FPGA&#8217;s memory access<br />
operations. Since most anti-Rowhammer detection systems are configured<br />
at the CPU level, this opens a new blindspot in CPU and cloud<br />
security.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/comment-page-1/#comment-1643070</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 23 Jun 2019 16:38:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182761#comment-1643070</guid>
		<description><![CDATA[https://hackaday.com/2019/06/21/this-week-in-security-sack-of-death-rambleed-hibp-for-sale-and-oracle-weblogic-again/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2019/06/21/this-week-in-security-sack-of-death-rambleed-hibp-for-sale-and-oracle-weblogic-again/" rel="nofollow">https://hackaday.com/2019/06/21/this-week-in-security-sack-of-death-rambleed-hibp-for-sale-and-oracle-weblogic-again/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/12/rambleed-vulnerability/comment-page-1/#comment-1642248</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 13 Jun 2019 05:01:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182761#comment-1642248</guid>
		<description><![CDATA[Paper at 
https://rambleed.com/docs/20190603-rambleed-web.pdf

Data can be read few bits per second]]></description>
		<content:encoded><![CDATA[<p>Paper at<br />
<a href="https://rambleed.com/docs/20190603-rambleed-web.pdf" rel="nofollow">https://rambleed.com/docs/20190603-rambleed-web.pdf</a></p>
<p>Data can be read few bits per second</p>
]]></content:encoded>
	</item>
</channel>
</rss>
