RowPress

Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomenon in DRAM that is different from RowHammer. Described in our ISCA'23 paper by Luo et al. at https://people.inf.ethz.ch/omutlu/pub/RowPress_isca23.pdf (by CMU-SAFARI)

RowPress Alternatives

Similar projects and alternatives to RowPress

  • vulns

    Named vulnerabilities and their practical impact

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better RowPress alternative or higher similarity.

RowPress reviews and mentions

Posts with mentions or reviews of RowPress. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-19.
  • There's a new way to flip bits in DRAM, and it works against the latest defenses
    2 projects | news.ycombinator.com | 19 Oct 2023
    For those interested, the key takeaway from this IMO is that by issuing many sequential reads, the memory controller will hold a target row open for an extended amount of time to service the consecutive accesses.

    This is in contrast to the original rowhammer attack, which issues accesses such that target rows are repeatedly opened and closed to trigger bitflips in neighboring rows.

    By stretching out the row open time to 30ms (!), the authors claim they are able to reliably trigger bitflips with a single row opening in 13% of tested rows at 50 C[1]. Some rows in certain chips can be flipped with access times of under 10ms[2].

    At more realistic row open times of 7.8 - 70us, there seems to be a 1/x relationship between row open time and number of activations required, they cumulative amount of time the row needs to be held open for to trigger a flip seems to remain fairly constant (around 50ms total from my very approximate estimations). Note that the attack needs to be executed in under 64 ms total, otherwise the automatic DRAM refresh will reset any progress made.

    The authors demonstrate this attack with a userspace program that maps a 1 GB hugepage to be able to directly manipulate the lower 30 physical address bits[3], although they don't seem to provide the row open times they end up being able to achieve in practice.

    The attack code itself: https://github.com/CMU-SAFARI/RowPress/blob/main/demonstrati...

    [1]: https://arxiv.org/pdf/2306.17061.pdf pg 5. obsv. 2 [2]: pg 6. obsv. 6 [3] pg. 11 sec 6.1

Stats

Basic RowPress repo stats
1
28
6.1
4 months ago

CMU-SAFARI/RowPress is an open source project licensed under MIT License which is an OSI approved license.

The primary programming language of RowPress is VHDL.

Popular Comparisons


Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com