@lunkw1ll presented our second paper at #ESORICS25 with the title "Verifying DRAM Addressing in Software". In this paper we show a novel way to verify DRAM addressing that were before reverse-engineered, for their correctness - without physical probing. We also found rank addressing functions with this approach. Additionally, an attacker can utilize the row conflict covert channel on DDR5 and exploit it for website fingerprinting attacks. You will find the paper here: https://florian.adamsky.it/research/publications/2025/2025-Verifying_DRAM_Addressing_in_Software_preprint.pdf
@lunkw1ll presented our paper with the title "Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity" at #ESORICS25. The problem that we see there is lack of real-world #Rowhammer attacks which contradicts the number of Rowhammer publications from academia. For more info, you will find a pre-print of our paper here: https://florian.adamsky.it/research/publications/2025/2025-Epistemology_of_Rowhammer_Attacks_preprint.pdf
I am packing for my trip tomorrow to Toulouse for 30th European Symposium on Research in Computer Security (#ESORICS25). We are presenting two papers there about our #Rowhammer research—another great collaboration with @lavados and his team.