Rowhammer is not stopped by ECC. That's from the original papers on the topic. It stands to reason variations on the theme won't be stopped by ECC either. That's because ECC only works on single bit errors. It's designed to stop low rate accidental bit flips by the random fluctuations of hardware errors and the occasional cosmic ray. It isn't intended to and will not stop the intentional flipping of many bits at once induced by Rowhammer. Some of the more advanced ECC systems will send a HALT and kill the system, but that isn't a common hardware setup. It's also very inconvenient and pretty much overkill for anything but the most sensitive work. If you think ECC setups will entirely protect you from Rowhammer, you're sorely mistaken.
I suggest reading the actual papers on the original Rowhammer attack, TRESpass, and SMASH for background (which are linked to from the Google abstract).
The only way to fix this is to re-engineer the geometries on RAM modules to prevent the underlying physics these attacks exploit. Or, alternatively, just not browse the web with your computer if you're that concerned.
EDIT to add: It might show you if an attack is possibly occurring if you know what you're looking at. That's a big IF.
I suggest reading the actual papers on the original Rowhammer attack, TRESpass, and SMASH for background (which are linked to from the Google abstract).
The only way to fix this is to re-engineer the geometries on RAM modules to prevent the underlying physics these attacks exploit. Or, alternatively, just not browse the web with your computer if you're that concerned.
EDIT to add: It might show you if an attack is possibly occurring if you know what you're looking at. That's a big IF.
Comment