Author: Denis Avetisyan
A new framework extends remote attestation to the hardware layer, providing a critical defense against increasingly sophisticated DRAM-based attacks.

This review details a remote attestation system leveraging Machine-Check Exceptions and Per-Row Activation Counters to detect and mitigate Rowhammer-induced faults.
While hardware is often treated as a foundational root of trust, increasingly subtle microarchitectural vulnerabilities challenge this assumption. This paper, ‘Towards Remote Attestation of Microarchitectural Attacks: The Case of Rowhammer’, proposes a shift from solely preventing these attacks to actively detecting them through remote attestation. We demonstrate the feasibility of this approach with HammerWatch, a protocol that leverages readily available hardware signals-Machine-Check Exceptions and Per-Row Activation Counters-to assess a system’s susceptibility to Rowhammer-induced disturbances, protected by TPM-anchored measurements. Can detection-oriented attestation provide a complementary layer of security, bolstering incomplete prevention mechanisms and enabling more robust system trustworthiness?
The Inherent Instability of Modern Memory
Contemporary dynamic random-access memory (DRAM), the workhorse of modern computing, faces a growing threat from attacks that circumvent conventional software-based security measures. These aren’t breaches of code, but rather manipulations of the physical hardware itself, exploiting the fundamental properties of how data is stored in DRAM cells. Traditional defenses, such as operating system permissions and firewalls, are rendered largely ineffective because the attacks operate at a level below software control. The core issue lies in the density of modern DRAM; packing billions of transistors into a small space creates inherent vulnerabilities as signals interact and interfere with each other. This hardware-level susceptibility necessitates a paradigm shift in security thinking, moving beyond software patches to explore novel mitigation strategies embedded within the memory system itself, or relying on architectural changes to reduce the attack surface.
The integrity of modern computing relies on the stable storage of data within Dynamic Random Access Memory (DRAM), yet recent discoveries reveal a fundamental weakness stemming from the physics of its operation. An attack known as Rowhammer doesn’t target software flaws, but instead exploits the close proximity of data rows within the memory chip itself. Repeatedly accessing a single row can generate electromagnetic interference, unintentionally flipping bits in adjacent rows – a phenomenon analogous to a physical hammer blow. This isn’t a matter of failing hardware, but a predictable consequence of how DRAM stores information as electrical charges, and the capacitive coupling between closely packed memory cells. Consequently, established security assumptions-that memory is a reliable, static store of data protected by software permissions-are fundamentally challenged, demanding new approaches to system hardening and data protection that account for these hardware-level vulnerabilities.
Recent investigations have moved DRAM vulnerabilities beyond the realm of academic speculation, confirming their potential for real-world exploitation. Researchers have successfully demonstrated bit flips – alterations of data at the hardware level – not just in controlled laboratory settings, but within standard computing systems running common operating systems and applications. These practical demonstrations have included successful attacks against memory encryption and virtualization technologies, showcasing the ability to compromise system security without any user interaction or malicious software installation. The demonstrated feasibility of these attacks underscores the urgency of addressing DRAM vulnerabilities, as current software-based security measures are demonstrably insufficient to prevent them and necessitate a re-evaluation of hardware security assumptions.
Beyond direct manipulation of memory cells, modern processors introduce additional avenues for attack through their internal microarchitecture. Speculative execution, a performance optimization technique, predicts future instructions and executes them preemptively; if these predictions are based on attacker-controlled data, vulnerabilities can arise. Similarly, cache timing attacks exploit the slight variations in access times to different memory locations, allowing adversaries to infer sensitive information or even manipulate program behavior. These attacks don’t target DRAM directly, but rather leverage the interaction between the processor and memory, effectively amplifying the impact of DRAM vulnerabilities by providing a means to bypass software-level protections and control data flow. The combination of these microarchitectural weaknesses with inherent DRAM flaws creates a complex threat landscape demanding innovative security solutions that address both hardware and software components.
Modeling Memory Behavior: A Necessary Rigor
Accurate modeling of Dynamic Random Access Memory (DRAM) behavior is crucial for comprehensive analysis of Rowhammer attacks and the development of effective mitigation strategies. Rowhammer exploits arise from unintended disturbance of neighboring memory rows during write operations; understanding the underlying physical mechanisms requires simulation capable of reproducing these disturbances with fidelity. Specifically, models must account for voltage margins, timing parameters, and the capacitive and inductive coupling between memory cells. Without accurate simulation, it is difficult to determine the conditions under which attacks are likely to succeed, evaluate the effectiveness of proposed defenses – such as Target Row Refresh (TRR) or Error Correcting Codes (ECC) – or predict vulnerability across different DRAM devices and operating conditions. Validated models allow researchers to systematically explore the parameter space and identify critical factors influencing attack success rates, ultimately enabling more robust and targeted security solutions.
Ramulator 2.0 is a cycle-accurate, open-source DRAM simulator built to facilitate research into dynamic random access memory behavior and security. It models key DRAM components including the memory controller, channels, ranks, banks, and rows, enabling detailed simulation of read, write, and activate operations. The simulator supports multiple DRAM standards, including DDR4 and DDR5, and allows for configuration of parameters such as timings, bus widths, and chip organization. Researchers utilize Ramulator 2.0 to evaluate the efficacy of potential countermeasures against attacks like Rowhammer by simulating their implementation and observing the resulting reduction in disturbance rates. The platform’s modular design permits the extension and integration of custom memory controllers and attack models, making it a versatile tool for exploring a wide range of DRAM-related phenomena.
Simulation results demonstrate a strong correlation between Rowhammer attack success rates and the characteristics of DDR5 DRAM technology. Specifically, the reduced voltage margins and increased density of DDR5, coupled with the implementation of features like Decision Feedback Equalization (DFE), significantly influence the probability of inducing bit flips in neighboring rows. Analysis shows that the timing parameters associated with DDR5’s prefetch buffer and write/read cycles are critical factors; variations in these parameters directly affect the amplitude and duration of disturbance signals. Furthermore, the effectiveness of error correction codes (ECC) in mitigating these errors is also dependent on the specific DDR5 implementation and its associated timings, making accurate modeling essential for evaluating ECC efficacy.
Ramulator 2.0 enables systematic investigation of DRAM vulnerability by allowing manipulation of key operational parameters. Researchers can adjust timings such as row hammer period, burst lengths, and the number of activated rows to quantify their influence on disturbance probability. Furthermore, the simulator supports configuration of DRAM organization, including the number of banks, bank groups, and the interleaving scheme, permitting analysis of architectural impacts on attack success. Variations in refresh policies and the implementation of error correction codes (ECC) can also be modeled, allowing for the evaluation of mitigation techniques. By sweeping these parameters, researchers can generate statistically significant data to characterize the attack surface and identify critical configurations that exacerbate or reduce vulnerability.

Establishing Trust at the Hardware Level: Remote Attestation
Conventional security measures are largely predicated on software integrity, offering limited protection against attacks that directly manipulate hardware. These software-based defenses are susceptible to compromise if an attacker gains control at a sufficiently low level, or if the vulnerability exists within the hardware itself. Increasingly, vulnerabilities are being discovered that bypass traditional software security, such as those exploiting unintended interactions within DRAM – exemplified by Rowhammer – or physical attacks. This necessitates a shift towards security mechanisms that establish trust at the hardware level, verifying the system’s foundational components and their configuration before software execution, and continuously monitoring for deviations from a trusted state. Relying solely on software defenses is therefore no longer sufficient to guarantee system integrity in the face of evolving hardware-based threats.
Remote attestation is a security process by which a device can prove its current state to a verifier, establishing trust in its hardware and software integrity. This is achieved through a cryptographic protocol where the device generates a signed statement, or attestation, based on measurements of its system components-including the bootloader, operating system, and critical applications. The verifier, possessing a trusted public key, can then validate this attestation and determine if the device is in a known, trusted configuration. Successful attestation confirms that the system has not been tampered with or compromised, providing assurance regarding its operational state before sensitive data is processed or accessed. This mechanism is particularly crucial in environments requiring high security, such as cloud computing and embedded systems.
HammerWatch augments standard remote attestation procedures by integrating hardware-specific evidence pertaining to Rowhammer attack resilience. Traditional remote attestation verifies software and firmware integrity; HammerWatch extends this by including measurements of DRAM device characteristics and configurations known to mitigate Rowhammer. This includes verification of address space layout randomization (ASLR) effectiveness, DRAM refresh rates, and the status of hardware-level mitigations such as Target Row Bypass (TRB). By attesting to these hardware-level parameters, HammerWatch provides assurance that the system not only appears secure at the software level, but also possesses the necessary underlying hardware protections against Rowhammer-based attacks, enabling a more comprehensive trust assessment.
A prototype remote attestation protocol, specifically designed to detect Rowhammer attacks, has been developed and rigorously tested. Across 20,000 simulated execution runs – encompassing both benign operations and malicious Rowhammer attempts – the protocol achieved 100% accuracy in identifying attack attempts. Critically, testing yielded zero false positives, indicating no incorrect identification of benign activity as malicious, and zero false negatives, demonstrating complete detection of all attempted Rowhammer attacks within the simulated environment. This performance suggests a high degree of reliability in distinguishing compromised system states from legitimate operation.

Beyond Attestation: Charting a Course for Proactive Security
Error-correcting code (ECC) memory, while a valuable asset in maintaining data integrity, presents an incomplete defense against sophisticated attacks like Rowhammer. These attacks don’t directly cause data corruption detectable by ECC; instead, they exploit the physical properties of DRAM to induce bit flips in adjacent memory rows. Because the altered data appears valid from a standard error-checking perspective, ECC fails to flag the malicious manipulation. Consequently, relying solely on ECC creates a false sense of security; effective mitigation demands a layered approach. This necessitates complementary defenses – such as target row isolation, memory access pattern randomization, or enhanced DRAM controller policies – to disrupt the physical mechanisms enabling Rowhammer and similar persistent memory vulnerabilities.
Recent investigations have revealed Rowpress, a novel DRAM attack vector that builds upon the foundations of Rowhammer, but distinguishes itself through sustained and deliberate row activations. Unlike the bit flips induced by Rowhammer’s rapid hammering, Rowpress utilizes prolonged activation of memory rows to induce charge loss in adjacent cells, ultimately leading to data corruption. This represents a significant evolution in DRAM vulnerability exploitation, demonstrating that simply mitigating the original Rowhammer attack is insufficient for comprehensive memory security. Rowpress’s slower, more methodical approach bypasses some existing defenses designed to detect rapid activation patterns, highlighting the need for more sophisticated monitoring and proactive mitigation techniques capable of identifying and neutralizing subtle, sustained attacks on DRAM integrity.
Addressing the persistent threat to DRAM integrity requires a fundamental shift towards proactive security measures in hardware design. Current mitigation strategies often react to errors or attempted exploits; future research should prioritize building resilience into the memory system itself. This includes exploring novel memory cell layouts, enhanced error detection and correction codes capable of handling more complex attack patterns, and the implementation of physical unclonable functions (PUFs) to uniquely identify and authenticate memory modules. Furthermore, investigations into dynamic voltage and frequency scaling techniques, coupled with advanced power management strategies, could reduce the susceptibility of DRAM to row activation attacks like Rowpress by minimizing the window of opportunity for exploitation. Ultimately, a preemptive approach-designing memory that is inherently resistant to these vulnerabilities-offers the most promising path toward truly secure and reliable computing systems.
Constructing genuinely resilient computing systems necessitates a multifaceted security strategy that integrates both hardware and software defenses. Relying solely on improvements to DRAM architecture, such as error correction codes, proves insufficient against increasingly sophisticated attacks like Rowhammer and Rowpress; these exploits demonstrate the ability to bypass physical-layer protections. Conversely, software-based mitigations alone are vulnerable to manipulation and may incur unacceptable performance overhead. A layered approach, where hardware provides the initial line of defense – detecting and potentially isolating errant memory accesses – while software implements proactive monitoring, access controls, and runtime integrity checks, offers a significantly stronger and more adaptable security posture. This combined strategy not only addresses existing vulnerabilities but also provides a framework for responding to future, currently unforeseen, DRAM-based attacks, ensuring long-term system stability and data integrity.
The pursuit of robust hardware security, as detailed in the exploration of Rowhammer mitigation, necessitates a shift towards provable correctness. The paper’s framework, extending attestation to hardware fault indicators like Machine-Check Exceptions, embodies this principle. It isn’t sufficient to merely detect an attack; the system must demonstrably prove the integrity of the underlying hardware state. This echoes Marvin Minsky’s assertion: “The question isn’t what computers can do, but what should they be programmed to do.” The article’s emphasis on verifiable hardware integrity aligns perfectly with Minsky’s call for purposeful computation – a system isn’t valuable if its outputs aren’t grounded in demonstrable, logical truth, especially when dealing with the subtle and potentially catastrophic vulnerabilities like those exposed by Rowhammer.
What Lies Ahead?
The pursuit of hardware attestation, as exemplified by this work, inevitably encounters the limitations inherent in attempting to formalize physical reality. Monitoring Machine-Check Exceptions and Per-Row Activation Counters offers a pragmatic, if imperfect, approach to detecting Rowhammer; however, it merely shifts the problem. Future work must address the inevitable arms race – the development of increasingly subtle fault injection techniques designed to evade these very monitors. The elegance of a truly secure system lies not in reactive detection, but in proactive prevention – a complete redesign of DRAM architecture to eliminate the underlying vulnerabilities.
A critical consideration is the scaling of this attestation framework. While effective for single-instance verification, the complexities of modern cloud environments and the sheer density of DRAM modules demand a more holistic solution. The notion of ‘trust’ becomes increasingly diffuse; attestation must extend beyond individual components to encompass the entire memory subsystem, potentially leveraging cryptographic techniques to establish verifiable provenance of data at the physical level.
Ultimately, the beauty of this endeavor – and its frustration – is the constant need for mathematical rigor. Demonstrating the absence of vulnerability is, of course, impossible. The goal, then, is not to achieve absolute security, but to define the boundaries of uncertainty with ever-increasing precision. The true measure of success will not be the detection of Rowhammer, but the formalization of its impossibility – a goal that, while distant, remains the only logically sound aspiration.
Original article: https://arxiv.org/pdf/2603.24172.pdf
Contact the author: https://www.linkedin.com/in/avetisyan/
See also:
- All Shadow Armor Locations in Crimson Desert
- Jujutsu Kaisen Season 3 Episode 12 Release Date
- Dark Marksman Armor Locations in Crimson Desert
- How to Beat Antumbra’s Sword (Sanctum of Absolution) in Crimson Desert
- Genshin Impact Dev Teases New Open-World MMO With Realistic Graphics
- Sega Reveals Official Sonic Timeline: From Prehistoric to Modern Era
- Top 5 Militaristic Civs in Civilization 7
- Sakuga: The Hidden Art Driving Anime’s Stunning Visual Revolution!
- Keeping AI Agents on Track: A New Approach to Reliable Action
- How to Get the Sunset Reed Armor Set and Hollow Visage Sword in Crimson Desert
2026-03-27 05:49