@lunkw1ll

23 Followers
14 Following
24 Posts

The #Rowhammer talk at #CCC is basically a tradition at this point.

So obviously it has returned to #39C3 and if I understood it right their conclusion was that 12.5% of RAMs (that they tested) are vulnerable to automated #Rowhammer attacks. Ouch!

#CCC #hacking #security

Two years of research work come to a head: I am very excited to announce that our paper titled "FlippyR.AM: Large-Scale Study of Rowhammer Prevalence" has been accepted at the #NDSS2026. We want to thank all the participants again for their work! If you are interested, you will find a preprint here: https://flippyr.am/FlippyRAM.pdf. Also, we will have the opportunity to give a talk about our results at the #39c3 this year! Thanks @lunkw1ll, @lavados for a great collaboration!
@lunkw1ll presented our second paper at #ESORICS25 with the title "Verifying DRAM Addressing in Software". In this paper we show a novel way to verify DRAM addressing that were before reverse-engineered, for their correctness - without physical probing. We also found rank addressing functions with this approach. Additionally, an attacker can utilize the row conflict covert channel on DDR5 and exploit it for website fingerprinting attacks. You will find the paper here: https://florian.adamsky.it/research/publications/2025/2025-Verifying_DRAM_Addressing_in_Software_preprint.pdf
@lunkw1ll presented our paper with the title "Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity" at #ESORICS25. The problem that we see there is lack of real-world #Rowhammer attacks which contradicts the number of Rowhammer publications from academia. For more info, you will find a pre-print of our paper here: https://florian.adamsky.it/research/publications/2025/2025-Epistemology_of_Rowhammer_Attacks_preprint.pdf
I am very happy that two papers from @lunkw1ll have been accepted at the 30th European Symposium on Research in Computer Security (#ESORICS). It was a great collaboration with @lavados, @hweissi and others. The first paper addresses the threats and problems to #Rowhammer research validity. The second paper presents a method for verifying DRAM addressing functions entirely in software. πŸŽ‰
We still have 1 T-shirt left and our study is still running for 2 weeks. Get your systems checked for the #Rowhammer effect and get a free T-shirt if you do it 10 times on the same system. Even if you do it just once, you have the change to win an Amazon gift card. Help us understand the Rowhammer Effect better! More infos: https://flippyr.am/
FLIPPYR.AM

Recently, @lavados, @lunkw1ll and @c1t gave a talk about #Rowhammer at the 38th Chaos Communication Congress #38C3 in Hamburg, Germany. Now, they are looking for participants for their large-scale Rowhammer study! πŸ”¨

Find out more about Rowhammer & participate in the study πŸ‘‡
https://www.isec.tugraz.at/flippyram or https://flippyr.am

FlippyR.AM: The large-scale Rowhammer study – ISEC

Arrived at #uASC. @lunkw1ll already presented our paper "Flipper: #Rowhammer on Steroids". If you are interested, the paper is freely available: https://uasc.cc/proceedings25/uasc25-heckel.pdf
Contributing to the #rowhammer research study, from https://flippyr.am/ @lunkw1ll @lavados talk at: https://media.ccc.de/v/38c3-ten-years-of-rowhammer-a-retrospect-and-path-to-the-future. If you’re interested
FLIPPYR.AM