Several DDR4 Memory Modules Proven to Be Vulnerable to Rowhammer
According to a recent report, it appears DDR4 memory modules are also vulnerable to an exploit dubbed as the Rowhammer.
Until now, it was believed that only DDR3 memory modules were vulnerable to Rowhammer, but now it has been proven that the DDR4 memory modules are also showing signs of vulnerabilities.
According to a research paper titled How Rowhammer Could Be Used to Exploit Weaknesses in Computer Hardware; it has appeared that many of the DIMMs are vulnerable to bitflipping which essentially converts 0s to 1s and vice versa.
The said report is published by Third I/O; an Austin, Texas-based high-speed bandwidth and supercomputing technologies provider and was presented at the Semicon China Conference:
Based on the analysis by Third I/O, we believe that this problem is significantly worse than what is being reported. And it is still visible on some DDR4 memory modules.
Despite the fact Samsun and other DDR4 memory modules manufacturers marketed their DDR4 products to be Rowhammer-free, the report proves otherwise.
However, as of this instant, the Rowhammer does not pose any imminent danger of security breach of PCs running the said memory modules.
While Samsun, Micron, and other manufacturers boasted TRR or Targeted Row Refresh technology; according to researchers, only 8 out of 12 DDR4 memory chips (including G.Skill) passed the tests:
Although the sample size of memory we tested was very small, we can definitively say that Rowhammer bit flips are most certainly reproducible on DDR4.
What is your take on this? Make sure to let us know in the comments section below!