Skip to content

A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).

License

Notifications You must be signed in to change notification settings

comsec-group/zenhammer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 

Repository files navigation

ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms

Academic Code Language Badge License: MIT contributions welcome Preprint: arXiv Paper

This repository provides the code accompanying the paper ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms that is to appear at USENIX Security 2024.

Branches

This repository consists of multiple branches with different tools:

  • dare contains the DARE tool to reverse-engineer DRAM address mappings.
  • ddr4_zen2_zen3_pub contains the ZenHammer Rowhammer fuzzer for DDR4 (Zen 2 and Zen 3).
  • ddr5_zen4_pub contains the ZenHammer Rowhammer fuzzer for DDR5 (Zen 4).

Getting Started

Instructions to build and run DARE and the ZenHammer fuzzer are provided in the respective branches' README.md files.

Citing our Work

To cite ZenHammer in academic papers, please use the following BibTeX entry:

@inproceedings{jattke.wipfli2024zenhammer,
  title={{{ZenHammer}}: {{R}}owhammer {{A}}ttacks on {{AMD}} {{Z}}en-based {{P}}latforms},
  author={Jattke, Patrick and Wipfli, Max and Solt, Flavien and Marazzi, Michele and Bölcskei, Matej and Razavi, Kaveh},
  booktitle={USENIX Security},
  year={2024},
  month = aug, 
  note = {\url{https://comsec.ethz.ch/wp-content/files/zenhammer_sec24.pdf}}
}

About

A Rowhammer fuzzer for AMD Zen-based systems (USENIX Security '24).

Resources

License

Stars

Watchers

Forks