{"id":221929,"date":"2025-09-16T03:21:10","date_gmt":"2025-09-16T08:21:10","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/09\/new-phoenix-attack-bypasses-rowhammer-defenses-in-ddr5-memory"},"modified":"2025-09-16T03:21:10","modified_gmt":"2025-09-16T08:21:10","slug":"new-phoenix-attack-bypasses-rowhammer-defenses-in-ddr5-memory","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/09\/new-phoenix-attack-bypasses-rowhammer-defenses-in-ddr5-memory","title":{"rendered":"New Phoenix attack bypasses Rowhammer defenses in DDR5 memory"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/1emxVQ6__qg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix.<\/p>\n<p>A Rowhammer attack works by repeatedly accessing specific rows of memory cells at high-speed read\/write operations to cause enough electrical interference to alter the value of the nearby bits from one to zero and vice-versa (bit flipping).<\/p>\n<p>An attacker could potentialluy corrupt data, increase their privileges on the system, execute malicious code, or gain access to sensitive data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK Hynix. A Rowhammer attack works by repeatedly accessing specific rows of memory cells at high-speed read\/write operations to cause enough electrical interference to alter the value of the nearby bits from one to [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523],"tags":[],"class_list":["post-221929","post","type-post","status-publish","format-standard","hentry","category-computing"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/221929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=221929"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/221929\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=221929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=221929"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=221929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}