SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism

Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom

33rd USENIX Security Symposium · Day 1 · USENIX Security '24

The "SledgeHammer" talk, presented by Ingab Kang at USENIX Security '24, delves into a significant advancement in Rowhammer attacks, demonstrating how **bank-level parallelism** in modern **DRAM** (Dynamic Random-Access Memory) can be leveraged to dramatically amplify bit flips. Rowhammer, a well-known hardware vulnerability, exploits the physical proximity of memory cells, where repeatedly accessing (hammering) a row can cause charge leakage in adjacent rows, leading to bit flips. While memory manufacturers have implemented mitigations like **TRResistive RAM (TRR)**, this research shows that these defenses can be circumvented, particularly on newer hardware generations and under default operating conditions, posing a renewed and amplified threat to system integrity.

AI review

This research on 'SledgeHammer' is a critical advancement in Rowhammer exploitation, demonstrating how bank-level parallelism can bypass existing mitigations and dramatically amplify bit flips on modern DDR4. The work shows practical exploitation for root access and the first DDR4 Rambleed, crucially extending attacks to web browsers under default configurations, effectively re-opening a 'closed' vulnerability. This is real research with severe implications that demands immediate attention from hardware and software vendors alike.

Watch on YouTube