Author: Denis Avetisyan
New research provides a detailed physical model to quantify how susceptible DRAM memory cells are to attacks like Rowhammer and Rowpress.

A comprehensive analysis of retention loss and leakage resistance provides a framework for assessing and comparing DRAM attack surfaces.
While dynamic random access memory (DRAM) is foundational to modern computing, its inherent volatility introduces vulnerabilities exploitable for both attack and security applications. This work, ‘Quantifying Memory Cells Vulnerability for DRAM Security’, presents a cell-level circuit framework that directly models DRAM vulnerability arising from physical charge leakage and disturbance pathways. By linking these device-level behaviors to system-level security properties-including retention, integrity, and confidentiality-we provide a quantitative assessment of DRAM susceptibility to failures like Rowhammer and Rowpress. Can this framework ultimately guide the design of more robust and secure memory systems, or will evolving attack vectors necessitate continuous refinement of these vulnerability models?
The Fragile Foundation of Modern Memory
Modern dynamic random-access memory (DRAM) operates on a deceptively simple principle: storing each bit of data as an electrical charge within a tiny capacitor, a component inherently prone to leakage. This approach, while enabling high density and relatively fast access, introduces a fundamental fragility to data storage. Unlike flash memory, which retains data even without power, DRAM requires constant refreshing – periodic recharging of these capacitors – to counteract the natural dissipation of charge. The scale of this challenge is immense, considering that a typical DRAM chip contains billions of these minuscule capacitors, each vulnerable to losing its charge due to factors like subthreshold\ conduction and resistive pathways. Consequently, the very foundation of modern computing relies on a continuous battle against the inevitable loss of information, demanding sophisticated error correction and refresh mechanisms to maintain data integrity.
Data storage in dynamic random-access memory (DRAM) is fundamentally impermanent, as the very nature of its design invites data loss over time. Each bit is held as an electrical charge within a tiny capacitor, but this charge isn’t perfectly contained; a process known as retention loss inevitably occurs. This leakage stems from two primary sources: SubthresholdConduction, where electrons ‘tunnel’ through the insulating barriers, and resistive pathways within the DRAM cell itself. Specifically, RB\_Resistance represents the resistance of the bitline, and RS\_Resistance indicates the source line resistance; both contribute to the gradual dissipation of stored charge. Consequently, DRAM requires periodic refresh cycles – essentially rewriting the data – to counteract these losses and maintain data integrity, inherently limiting the practical storage duration of each cell.
The reliability of data storage in Dynamic Random Access Memory (DRAM) hinges on a critical parameter known as the VoltageThreshold – the minimum voltage a capacitor must maintain to represent a logical ‘1’. However, DRAM cells aren’t perfectly isolated entities. Imperfect isolation allows for unintended interactions – known as ‘cell disturb’ – where the act of reading or writing to one cell can subtly alter the charge state of its neighbors. This phenomenon is exacerbated by decreasing cell sizes and increasing memory density, as closer proximity intensifies capacitive coupling and leakage currents. Consequently, maintaining a robust VoltageThreshold becomes increasingly challenging, demanding sophisticated error correction schemes and refresh cycles to counteract the inevitable data corruption caused by these inter-cell disturbances. The delicate balance between storage capacity, operational speed, and data integrity, therefore, relies heavily on mitigating the effects of imperfect isolation and ensuring each cell consistently exceeds its VoltageThreshold.

Unlocking Vulnerabilities: Exploiting DRAM Organization
Dynamic Random Access Memory (DRAM) is organized hierarchically into banks, rows, and columns to facilitate efficient data access. Each bank contains multiple rows and columns of memory cells. This physical arrangement, while enabling high density and performance, introduces inherent capacitive coupling between adjacent rows within the same bank. Specifically, when a row is activated for a read or write operation, the associated bitlines are charged. This charging process creates an electric field that can capacitively couple with the bitlines of neighboring, inactive rows. This coupling can subtly alter the charge stored in the memory cells of those neighboring rows, creating a potential for data disturbance and, under certain conditions, bit flips.
Read disturbance in Dynamic Random Access Memory (DRAM) arises from the capacitive nature of memory cells and their physical proximity. Activating a row to perform a read operation introduces voltage fluctuations within the semiconductor substrate. These fluctuations can capacitively couple to neighboring, unselected rows, altering the stored charge within those cells. If the charge alteration exceeds the minimum voltage required to maintain data integrity, a bit flip – a transition from a logical 0 to 1, or vice versa – can occur in the adjacent rows. The magnitude of this disturbance is influenced by factors including DRAM density, operating voltage, and temperature, and is inherent to the fundamental operation of DRAM technology.
The read disturbance effect in DRAM can be amplified through techniques such as RowHammer and RowPress, which involve repeated or prolonged activation of specific rows – termed ‘aggressor’ rows – to induce bit flips in adjacent, ‘victim’ rows. Research indicates that while RowHammer demonstrates a higher inherent charge leakage from aggressor rows, RowPress provides greater, pattern-dependent control over the location of induced bit flips in victim rows. This suggests that RowPress, despite potentially lower overall disturbance magnitude, offers a more precise method for targeting specific memory locations and manipulating data through read disturbances.

Evidence of Evolving Threats: Advanced Attacks and Their Implications
PatternAwareAttack techniques improve the efficacy of read disturbance attacks by strategically utilizing data patterns during memory access. Specifically, patterns like the CheckerboardPattern-where alternating rows are accessed-amplify the voltage fluctuations induced in adjacent memory cells. This amplification occurs because the patterned access exacerbates the charge sharing and capacitive coupling between cells, increasing the probability of bit flips. Unlike random access patterns, these deliberate patterns focus disturbance effects, making attacks more reliable and reducing the number of required accesses to induce errors, thereby enhancing the overall effectiveness of the attack.
Targeted Integrity Violation attacks represent a focused manipulation of memory, specifically altering the value of individual bits within a targeted memory location. This contrasts with indiscriminate bit flips observed in traditional memory attacks. Confidentiality attacks, conversely, do not directly modify data but instead leverage observed bit flips – potentially induced by attacks like RowPress – to infer the original data values. The success of these attacks relies on correlating flipped bits with the underlying data representation; for example, observing a bit flip in a specific position might indicate a ‘1’ was originally stored there. The ability to achieve high accuracy in data inference, as demonstrated with up to 90%+ accuracy, highlights the potential for information leakage even without direct data modification.
Existing mitigation strategies, such as Error Correcting Code (ECC) and Target Row Refresh, are demonstrably insufficient to prevent advanced memory attacks. Our research indicates that the RowPress technique generates a significantly larger Pattern-induced Resistance Gap ( \Delta G_{rel} ) compared to the RowHammer attack, indicating a greater capacity for inducing selective bit flips and compromising data integrity. Furthermore, RowPress achieves substantially improved data confidentiality inference accuracy, reaching up to 90%+, exceeding the performance of RowHammer in extracting information from observed bit flips. These results demonstrate that RowPress bypasses common defenses and poses a heightened threat to system security.
Profiling the Decay: Characterizing DRAM Leakage Mechanisms
Retention profiling stands as a fundamental technique in the characterization of Dynamic Random Access Memory (DRAM) cell leakage, meticulously quantifying the rate at which electrical charge dissipates from a memory cell. This process involves repeatedly writing data to a DRAM cell and then measuring the time it takes for the stored information to become corrupted due to leakage current – a critical indicator of data reliability. By precisely monitoring this charge loss, researchers and engineers gain valuable insights into the underlying physics governing DRAM behavior, particularly the impact of temperature, voltage, and manufacturing variations. Accurate retention profiling is not merely a diagnostic tool; it forms the basis for developing and validating mitigation strategies aimed at enhancing DRAM data retention and preventing data corruption, especially in high-density memory configurations and demanding computing environments.
DRAM retention profiling, essential for understanding data leakage, frequently leverages the capabilities of an FPGA_TestPlatform to achieve granular control and accurate measurement of dynamic random-access memory behavior. This platform enables researchers to meticulously manipulate voltage levels, timing parameters, and access patterns, effectively isolating and quantifying charge loss within individual DRAM cells. The FPGA’s programmable logic allows for the creation of customized test sequences and the implementation of precise timing control, far exceeding the capabilities of conventional DRAM testing equipment. Consequently, the FPGA_TestPlatform provides a robust and versatile environment for characterizing DRAM leakage phenomena, supporting detailed analysis and the development of targeted mitigation strategies to improve data retention and system reliability.
Precise DRAM retention profiling is crucial for uncovering potential security weaknesses and validating the efficacy of countermeasures designed to prevent data corruption. Recent analysis demonstrates a significant disparity between RowPress and RowHammer attack mechanisms; RowPress exhibits substantially higher resistance – one to two orders of magnitude greater – suggesting a weaker leakage current within the p-well of the memory cells. However, this resistance is offset by a considerably lower bitline resistance, which effectively amplifies leakage along the bitlines and creates a pathway for data manipulation. This nuanced understanding of leakage characteristics, differentiating between p-well and bitline contributions, is essential for developing targeted mitigation strategies and improving the overall resilience of DRAM systems against emerging threats.
The study of DRAM vulnerabilities, as detailed in this work, reveals an inherent fragility within complex systems. It’s a process of observing how these systems, even at the silicon level, learn to age, and ultimately, how their retention characteristics degrade under stress. This aligns with the observation that “mathematics is the art of impossible.” Andrey Kolmogorov understood that probing the limits of a system – pushing it to its breaking point, as this research does with Rowhammer and Rowpress attacks – isn’t about finding a perfect, immutable solution, but rather about understanding the boundaries of what’s possible. The meticulous physical modeling presented here isn’t necessarily about preventing decay, but about characterizing it, quantifying its progression, and accepting that some level of vulnerability is intrinsic to the system’s design. Sometimes, observing the process is better than trying to speed it up.
The Erosion of Certainty
This work, in its detailed mapping of DRAM cell behavior, does not so much solve the problem of Rowhammer and Rowpress attacks as illuminate the inevitable cost of density. Every bit packed closer to its neighbor introduces a new surface for decay, a new vector for unintended influence. The model presented is a snapshot-a precise rendering of a system perpetually trending towards entropy. Its value, then, lies not in static defense, but in providing a benchmark against which future vulnerabilities will be measured, a calibration point for the accelerating rate of discovery.
The true challenge now extends beyond characterizing leakage resistance and retention loss. It requires a fundamental re-evaluation of memory architecture itself. Simplistic mitigation strategies, those which merely mask symptoms, will inevitably falter. The focus must shift toward designs that inherently limit the radius of influence for any given cell, accepting a potential increase in physical space as the price of logical isolation. Architecture without history is fragile and ephemeral; a true understanding of these attacks demands a reckoning with the physical realities that underpin computation.
Every delay in addressing these vulnerabilities is not a setback, but the price of understanding. The path forward isn’t about building impenetrable fortresses, but about constructing systems that age gracefully, acknowledging that all structures, even those of silicon and charge, are ultimately transient. The task is not to prevent decay, but to anticipate it.
Original article: https://arxiv.org/pdf/2603.18549.pdf
Contact the author: https://www.linkedin.com/in/avetisyan/
See also:
- Console Gamers Can’t Escape Their Love For Sports Games
- ARC Raiders Boss Defends Controversial AI Usage
- Top 8 UFC 5 Perks Every Fighter Should Use
- Top 10 Must-Watch Isekai Anime on Crunchyroll Revealed!
- The Limits of Thought: Can We Compress Reasoning in AI?
- Best Open World Games With Romance
- Games That Will Make You A Metroidvania Fan
- Top 10 Scream-Inducing Forest Horror Games
- Best Uriel Build in Warframe
- Detroit: Become Human Has Crossed 15 Million Units Sold
2026-03-20 10:36