Modeling Rowhammer memory corruption in the gem5 simulator - LIRMM - Laboratoire d’Informatique, de Robotique et de Microélectronique de Montpellier Access content directly
Conference Papers Year : 2022

Modeling Rowhammer memory corruption in the gem5 simulator

Loïc France
  • Function : Author
  • PersonId : 1095783
  • IdRef : 270295496
Florent Bruguier
David Novo
Pascal Benoit


In modern computers, the main memory is the target of a security threat called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Numerous countermeasures have been proposed, some of the most efficient ones relying on memory controller modifications, which make them non-integrable in existing systems. These solutions have to be effective against attacks on current and future architectures and technology nodes. In order to prove the efficiency of such mitigation techniques, we have to use simulation platforms. Unfortunately, existing architecture simulators do not provide any implementation of unintended memory modifications like bitflips. Integrating memory corruption into architecture simulators would allow the construction of attacks and mitigations for current and future computers, using feedback from the simulator. In this paper, we propose an implementation of the Rowhammer effect in the gem5 architecture simulator, demonstrate its capabilities and state its limitations.
Embargoed file
Embargoed file
0 7 23
Year Month Jours
Avant la publication
Thursday, October 17, 2024
Embargoed file
Thursday, October 17, 2024
Please log in to request access to the document

Dates and versions

lirmm-03817303 , version 1 (17-10-2022)


  • HAL Id : lirmm-03817303 , version 1


Loïc France, Florent Bruguier, Maria Mushtaq, David Novo, Pascal Benoit. Modeling Rowhammer memory corruption in the gem5 simulator. THCon 2022 - Toulouse Hacking Conference, Apr 2022, Toulouse, France. ⟨lirmm-03817303⟩
58 View
7 Download


Gmail Facebook X LinkedIn More