Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

The Rowhammer effect is a disturbance error in DRAM that attackers can trigger from software. The first publication on Rowhammer in 2014 evaluated 129 Dual In-line Memory Modules (DIMMs) on an FPGA and showed that 110 DIMMs are affected, indicating that Rowhammer is a widespread issue. However, until now, no case outside of academia is known in which Rowhammer was used for attacks, indicating a stark discrepancy between the attention Rowhammer receives and its real-world relevance.

This paper systematically analyzes 32 offensive Rowhammer papers, including 48 experiments. However, we avoid finger-pointing but identify six threats to the validity and relevance of Rowhammer research results and give multiple examples. The threats include small sample sizes, overestimated attacker capabilities, unrealistic attack scenarios, non-comparability of the results, age and wear of hardware, and sub-optimal attack performance metrics. Additionally, we provide recommendations with detailed justification to the scientific community to mitigate those threats: (1) pre-experimental testing of DIMM integrity, (2) increasing and broadening the DIMM sample size, (3) expanding reproduction studies of published work, (4) defining attacks in real-world conditions and distinguishing them from theoretical ones, (5) publishing DIMM manufacturing data, (6) documenting DIMM wear and, (7) leveraging multiple metrics for bit flip evaluations.
Original languageEnglish
Title of host publicationComputer Security – ESORICS 2025
Subtitle of host publication30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III
EditorsVincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
PublisherSpringer, Cham
Pages204–223
Number of pages20
ISBN (Electronic)978-3-032-07894-0
ISBN (Print)978-3-032-07893-3
DOIs
Publication statusPublished - 18 Oct 2025
Event30th European Symposium on Research in Computer Security, ESORICS 2025 - Toulouse, France
Duration: 22 Sept 202524 Sept 2025

Publication series

NameLecture Notes in Computer Science
Volume16055 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference30th European Symposium on Research in Computer Security, ESORICS 2025
Abbreviated titleESORICS 25
Country/TerritoryFrance
CityToulouse
Period22/09/2524/09/25

Keywords

  • Rowhammer
  • Research Validity
  • SoK

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Dive into the research topics of 'Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity'. Together they form a unique fingerprint.

Cite this