RowHammer, RowPress & Beyond: Invited Talk at Dagstuhl MAD Seminar - 27.11.2023

Onur Mutlu Lectures
Onur Mutlu LecturesMar 11, 2026

Why It Matters

RowHammer demonstrates that hardware scaling flaws can become systemic security vulnerabilities, forcing the industry to redesign memory interfaces and adopt proactive mitigation strategies to protect critical computing infrastructures.

Key Takeaways

  • RowHammer exploits DRAM scaling to induce predictable bit flips.
  • Memory reliability now an increasingly system-wide security concern.
  • Open-source testing infrastructure enables large‑scale DRAM vulnerability studies.
  • Future chips may require fewer activations to trigger flips.
  • Co‑design of memory and system needed to mitigate robustness risks.

Summary

The Dagstuhl MAD seminar talk examined RowHammer and related DRAM disturbances, tracing their origins from early research to today’s large‑scale security implications. The speaker highlighted how shrinking DRAM cells increase electrical noise, making bit flips more likely, and presented data from Facebook, Microsoft, and Google that link newer chip generations to higher failure rates.

Key technical insights included the activation‑count threshold dropping from ~239 k to a few thousand as process nodes advance, and the distinction between single‑sided and double‑sided hammering that dramatically raises flip probability. The open‑source testing platform built by the researchers allows exhaustive stress‑testing beyond manufacturer specifications, revealing that over 80 % of modern DRAM from the three major vendors is vulnerable.

Notable examples featured Google Project Zero’s exploitation of RowHammer to corrupt page tables and break native‑client sandboxes, as well as the “sandwich” technique that places a victim row between two aggressor rows for maximal disturbance. The talk also referenced variable retention time phenomena and flash‑memory read‑disturb issues, underscoring that these hardware quirks span multiple memory technologies.

The broader implication is clear: memory can no longer be treated as a passive component. System architects must co‑design hardware and software safeguards—such as stronger isolation, refresh‑rate adaptations, and error‑correcting mechanisms—to preserve safety, reliability, and security as DRAM scaling continues toward 2025‑2030.

Original Description

Title: RowHammer, RowPress & Beyond: Can We Be Free of Bitflips (Soon)?
Invited Talk at Dagstuhl MAD (Microarchitectural Attacks & Defenses) Seminar
Speaker: Prof. Onur Mutlu
Date: 27 November 2023
Recommended Reading:
====================
RowHammer: A Retrospective
Fundamentally Understanding and Solving RowHammer
RowPress: Amplifying Read Disturbance in Modern DRAM Chips
A Modern Primer on Processing in Memory
Intelligent Architectures for Intelligent Computing Systems
RECOMMENDED LECTURE VIDEOS & PLAYLISTS:
========================================
Computer Architecture Fall 2021 Lectures Playlist:
Digital Design and Computer Architecture Spring 2021 Livestream Lectures Playlist:
Featured Lectures:
Interview with Professor Onur Mutlu:
The Story of RowHammer Lecture:
Accelerating Genome Analysis Lecture:
Memory-Centric Computing Systems Tutorial at IEDM 2021:
Intelligent Architectures for Intelligent Machines Lecture:
Computer Architecture Fall 2020 Lectures Playlist:
Digital Design and Computer Architecture Spring 2020 Lectures Playlist:
Public Lectures by Onur Mutlu, Playlist:
Computer Architecture at Carnegie Mellon Spring 2015 Lectures Playlist:
Rethinking Memory System Design Lecture @stanfordonline :

Comments

Want to join the conversation?

Loading comments...