Your IP Your Status


What is Rowhammer?

Rowhammer is a term coined to describe a hardware vulnerability that affects dynamic random-access memory (DRAM) modules. This vulnerability can be exploited by repeatedly accessing or "hammering" a row of memory cells, which causes electrical interference. This interference can lead to the flipping of adjacent memory bits, resulting in errors or even security breaches.

Origin of Rowhammer

Rowhammer was first discovered by researchers from Carnegie Mellon University in 2014. They found that by rapidly accessing rows of memory cells, they could induce "bit flips" in nearby rows. This discovery shook the tech industry as it revealed a significant security threat that could potentially compromise the integrity of systems and data.

Practical Application of Rowhammer

One practical application of Rowhammer is in the realm of cybersecurity. Attackers can exploit this vulnerability to bypass security measures and gain unauthorized access to sensitive information. By targeting specific memory locations, attackers can manipulate data or execute arbitrary code, posing a severe threat to both individual users and organizations.

Benefits of Rowhammer

While Rowhammer poses a significant security risk, researchers and developers have also leveraged this vulnerability for beneficial purposes. One such application is in the field of fault injection testing. By intentionally inducing bit flips in memory, researchers can evaluate the robustness of hardware and software systems against potential errors and vulnerabilities. This proactive approach helps in identifying and mitigating potential weaknesses before they can be exploited by malicious actors.


While Rowhammer has gained attention in the tech community, it's not as widespread as other types of vulnerabilities. However, its potential impact on security makes it a significant concern for system developers and cybersecurity professionals.

Partial mitigation techniques have been developed, such as memory isolation and error correction codes (ECC). However, fully eliminating the vulnerability may require hardware-level changes in future DRAM designs.

To protect against Rowhammer attacks, keep your system software up to date, enable security features like ECC if available, and be cautious of running untrusted code or visiting malicious websites that could exploit this vulnerability.


Score Big with Online Privacy

Enjoy 2 Years
+ 4 Months Free

undefined 45-Day Money-Back Guarantee




Defend your data like a goalkeeper:
4 months FREE!

undefined 45-Day Money-Back Guarantee