Toggle light / dark theme

New Phoenix attack bypasses Rowhammer defenses in DDR5 memory

Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix.

A Rowhammer attack works by repeatedly accessing specific rows of memory cells at high-speed read/write operations to cause enough electrical interference to alter the value of the nearby bits from one to zero and vice-versa (bit flipping).

An attacker could potentialluy corrupt data, increase their privileges on the system, execute malicious code, or gain access to sensitive data.

Leave a Comment

Lifeboat Foundation respects your privacy! Your email address will not be published.

/* */