It is pointed out that the target range of the 'Rowhammer' attack that falsifies the data stored in DRAM is expanding due to memory miniaturization



The 'Rowhammer ' attack, which exploits the vulnerability of being able to tamper with data stored at another address by repeatedly accessing one address of DRAM, has declined considerably due to countermeasures by chip makers. However, Google researchers have announced that there is a new technique called 'Half-Double ' that allows attacks to propagate across adjacent lines.

Google Online Security Blog: Introducing Half-Double: New hammering technique for DRAM Rowhammer bug

https://security.googleblog.com/2021/05/introducing-half-double-new-hammering.html



hammer-kit / 20210525_half_double.pdf at main · google / hammer-kit · GitHub

https://github.com/google/hammer-kit/blob/main/20210525_half_double.pdf



Google says Rowhammer attacks are gaining range as RAM is getting smaller | The Record by Recorded Future

https://therecord.media/google-says-rowhammer-attacks-are-gaining-range-as-ram-is-getting-smaller/



In the conventional 'Rowhammer', when a specific address of DRAM is repeatedly accessed ('Aggressor' in the figure below), bit inversion is detected in two adjacent rows ('Victim' in the figure).



However, it has been confirmed that the newly discovered 'Half-Double' jumps over adjacent rows and propagates bit inversion.

According to the experimental results, when a large number of accesses were concentrated on 'Aggressor (A)', some of them were connected to 'Victim (C)' via 'Aggressor (B)'. 'Half-Double' is a characteristic peculiar to a silicon substrate, and it is thought that the propagation distance increases as the cell shape becomes smaller.



Google has worked with JEDEC, a semiconductor engineering industry group, and other industry partners to explore 'Rowhammer' countermeasures and solutions. The information disclosure is intended to invite all stakeholders to participate in the project in order to develop more practical and effective solutions.

in Hardware,   Security, Posted by logc_nt