Revisiting RowHammer - Top Picks in Hardware and Embedded Security - Prof. Onur Mutlu - 30.10.2025

Onur Mutlu Lectures
Onur Mutlu LecturesMar 21, 2026

Why It Matters

The study proves that Rowhammer remains an unsolved, escalating security threat in modern DRAM, forcing the industry to adopt new standards and mitigation strategies to protect critical data and system integrity.

Key Takeaways

  • Newer DRAM chips exhibit dramatically lower hammer thresholds.
  • Existing mitigation techniques fail to scale with advancing DRAM technology.
  • Study of 1,600 chips proves Rowhammer vulnerability across vendors.
  • Industry misconceptions about “Rowhammer solved” were widely debunked.
  • Per‑row activation counting standardized in DDR5 as direct response.

Summary

The talk revisits the seminal Rowhammer problem, presenting the 2020 "Revisiting Rowhammer" paper that conducted the largest experimental study to date on real DRAM chips. By testing roughly 1,600 devices from three major vendors across DDR3, DDR4, and LPDDR4 generations, the authors demonstrate that newer memory technologies are far more susceptible, with some chips flipping bits after only 4,800 activations. Key findings include a steep decline in the number of activations required to induce bit flips, the inadequacy of existing mitigation schemes such as increased refresh rates or probabilistic adjacent row activation, and the revelation that industry claims of having “solved” Rowhammer were unfounded. The paper also introduced the HC (hammer count) metric and a comprehensive testing infrastructure that has become the de‑facto standard for subsequent academic and industry research. Prof. Mutlu cites the industry’s reaction: the JEDEC Rowhammer task group was re‑formed, two JEDEC white papers now reference this work, and DDR5 incorporated per‑row activation counting—a direct outcome of the study’s methodology. He also highlights a memorable anecdote where a Micron executive dismissed the need for stronger ECC, underscoring the gap between academic findings and vendor perceptions. The implications are clear: Rowhammer is a worsening scaling issue that threatens data integrity, VM isolation, and cryptographic keys. Without robust, scalable mitigations, future DRAM generations will face escalating security risks, prompting both standards bodies and chip designers to adopt more aggressive countermeasures.

Original Description

Title: Revisiting RowHammer
Lecturer: Professor Onur Mutlu (https://people.inf.ethz.ch/omutlu/)
Venue: Top Picks in Hardware and Embedded Security
Date: October 30, 2025
Recommended Reading:
====================
A Modern Primer on Processing in Memory
Memory-Centric Computing: Solving Computing's Memory Problem
Memory-Centric Computing: Recent Advances in Processing-in-DRAM
Intelligent Architectures for Intelligent Computing Systems
RowHammer: A Retrospective
Fundamentally Understanding and Solving RowHammer
Accelerating Genome Analysis via Algorithm-Architecture Co-Design
From Molecules to Genomic Variations: Accelerating Genome Analysis via Intelligent Algorithms and Architectures
RECOMMENDED LECTURE VIDEOS & PLAYLISTS:
========================================
Digital Design and Computer Architecture Spring 2025 Livestream Lectures Playlist:
Fundamentals of Computer Architecture Fall 2025 Livestream Lectures Playlist:
Seminar in Computer Architecture Spring 2025 Livestream Lectures Playlist:
Computer Architecture Fall 2024 Lectures Playlist:
Interview with Professor Onur Mutlu:
TCuARCH meets Prof. Onur Mutlu
Arch. Mentoring Workshop @ISCA'21 - Doing Impactful Research
The Story of RowHammer Lecture:
Accelerating Genome Analysis Lecture:
Memory-Centric Computing Systems Tutorial at IEDM 2021:
Intelligent Architectures for Intelligent Machines Lecture:
Featured Lectures:

Comments

Want to join the conversation?

Loading comments...