GET /congress/2025/event/1627c5c1-db61-5117-aa41-991850cc20a8/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": "1627c5c1-db61-5117-aa41-991850cc20a8",
    "kind": "official",
    "name": "Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM",
    "slug": "rowhammer-in-the-wild-large-scale-insights-from-flippyr-am",
    "url": "https://api.events.ccc.de/congress/2025/event/1627c5c1-db61-5117-aa41-991850cc20a8/?format=api",
    "track": "security",
    "assembly": "ccc",
    "room": "ba692ba3-421b-5371-8309-60acc34a3c05",
    "location": null,
    "language": "en",
    "description": "This will be a followup talk after our talk \"Ten Years of Rowhammer: A Retrospect (and Path to the Future)\" at 38C3.\r\nIn the talk last year we gave an overview of the current state of Rowhammer and highlighted that there are no large-scale prevalence studies.\r\nWe wanted to change that and asked the audience to participate in our large-scale study on Rowhammer prevalence.\r\n\r\nWe performed the large-scale study on Rowhammer prevalence thanks to many volunteers supporting our study by measuring their systems.\r\nIn total, we collected 1006 datasets on 822 different systems (some systems were measured multiple times).\r\nWe show that 126 of them (12.5%) are affected by Rowhammer with our fully-automated setup.\r\nThis should be seen as a lower bound, since the preconditions required for effective tools failed on ~50% of the systems.\r\nAmong many other insights, we learned that the fully-automated reverse-engineering of DRAM addressing functions is still an open problem and we assume the actual number of affected systems to be higher as the 12.5% we measured in our study.\r\n\r\nNow, one year after our talk at the 38C3, we want to give an update on the current state of Rowhammer, since multiple new insights were published in the last year:\r\nThe first reliable Rowhammer exploit on DDR5, a JavaScript implementation of Rowhammer that works on current DDR4 systems, and an ECC bypass on DDR4, just to name a few.\r\nAdditionally, we want to present the results of our large-scale study on Rowhammer prevalence which was supported by the audience from last year's talk.",
    "schedule_start": "2025-12-29T23:00:00+01:00",
    "schedule_duration": "00:40:00",
    "schedule_end": "2025-12-29T23:40:00+01:00"
}