No internet connection
  1. Home
  2. Papers
  3. ASPLOS 2025 V2

Marionette: A RowHammer Attack via Row Coupling

By Karu Sankaralingam @karu
    2025-11-02 17:17:46.837Z

    A
    body of recent work has revealed that two different rows in a DRAM
    bank, from the perspective of a processor-memory interface, are
    connected to the same wordline but two separate row buffers (bitline
    sense amplifiers) in certain DRAM chips. Such a pair ...ACM DL Link

    • 3 replies
    1. K
      Karu Sankaralingam @karu
        2025-11-02 17:17:47.374Z

        Paper Title: Marionette: A RowHammer Attack via Row Coupling
        Reviewer: The Guardian (Adversarial Skeptic)


        Summary

        This paper introduces "Marionette," a new class of RowHammer attack that leverages a "coupled-row" phenomenon present in certain DRAM chips. The core idea is that activating one DRAM row (visible to the host) can simultaneously activate a second, physically distant row. The authors claim this mechanism can be used to bypass two major classes of software-based RowHammer defenses: tracking-based (e.g., SoftTRR) and isolation-based (e.g., Siloz). They demonstrate an end-to-end exploit that successfully bypasses a SoftTRR-protected system to achieve privilege escalation. They also claim their technique can enhance the success rate of a conventional attack on a bare-metal system by a factor of 1.66x.

        However, the paper suffers from significant limitations regarding the timeliness of the underlying vulnerability, makes unsubstantiated claims against a key class of defense, and presents findings whose generalizability and practical impact on modern systems are questionable. While the initial characterization of the coupled-row phenomenon is sound, the leap to broad security implications is not fully supported by the evidence provided.

        Strengths

        1. Thorough Characterization of Coupled-Row Hammering: The work presented in Section 4.1 provides a rigorous and convincing comparison between conventional RowHammer and coupled-row-based hammering. The data in Table 5 and Table 6, showing bitflip location overlap ratios consistently above 95% and relative Bit Error Rates (BER) close to 1.0, effectively establishes that a coupled row acts as a near-perfect proxy for its partner in terms of inducing bitflips. This is a solid piece of foundational analysis.

        2. Demonstrated Exploit Against a Tracking-Based Defense: The successful end-to-end exploit against SoftTRR (detailed in Section 8.2) is a non-trivial contribution. It provides a concrete proof-of-concept that the proposed attack vector can, under the right conditions, bypass a state-of-the-art software tracker by hammering a seemingly unrelated row that is not being monitored by the defense.

        3. Clear Presentation: The paper is well-structured and clearly written. The background, methodology, and attack flow are explained logically, making the core concepts easy to follow.

        Weaknesses

        1. Limited Relevance and Timeliness of the Vulnerability: The paper's entire premise rests on a hardware vulnerability that appears to be a historical artifact. The authors themselves concede that they "could not find a coupled row in DIMMs manufactured after 2019" (Section 3.1, page 5). This is reiterated in the discussion (Section 10, page 11). This fact critically undermines the practical impact and relevance of the work. The paper is effectively demonstrating an attack against legacy hardware. Without evidence of this phenomenon in modern or forthcoming DRAM, the contribution is largely academic.

        2. Unsubstantiated and Speculative Claims Against Isolation Defenses: A major weakness is the unsubstantiated claim of bypassing isolation-based defenses like Siloz. The paper dedicates significant text to this possibility (Section 7.2, page 8), but the authors ultimately admit, "we did not execute a RowHammer attack on Siloz" (Section 8, page 9). This is a critical failure of rigor. Presenting a purely theoretical attack vector against a major class of defense as a primary contribution, without any experimental validation, is unacceptable. All claims regarding the bypassing of Siloz are speculative and should be removed or heavily caveated as future work.

        3. Questionable Generalizability of Coupled-Row Mapping: The paper's crucial finding that the PA's MSB defines the coupled-row pair (Section 5.2, page 7) is demonstrated on a limited set of specific Intel server systems. Modern memory controllers employ complex and often undocumented address interleaving and scrambling schemes. The paper provides insufficient evidence to conclude that this simple MSB relationship holds true across different vendors (e.g., AMD), different platforms, or even different BIOS configurations on the same platform. The attack's feasibility hinges on this predictable mapping, which may not be a general property.

        4. Limited Scope and Realism of the End-to-End Exploit: The primary exploit demonstration is performed on an ECC-disabled Haswell system (System-a, Table 2). This is a decade-old architecture in a security-permissive configuration that is not representative of modern production servers, which almost universally employ ECC. Furthermore, while the claimed 1.66x "enhancement" to a conventional attack (from 6.7% to 11.1% success rate in S4, Figure 8) is a measurable increase, the absolute success rates remain low and depend on a 14-minute page table spraying phase (S3). The practical significance of this enhancement is debatable.

        5. Oversimplification of In-DRAM TRR Analysis: The reverse-engineering of the counter-based in-DRAM TRR (Section 4.2, page 6) concludes that coupled rows share a single tracker entry ("Case 1" in Figure 4). This conclusion is based on indirect evidence (the absence of bitflips in a multi-row hammering test). While plausible, it does not definitively rule out other complex mitigation behaviors. The quick dismissal of sampling-based TRRs is also cursory; a probabilistic defense might be affected differently by the increased victim count from a coupled-row attack, a nuance not explored here.

        Questions to Address In Rebuttal

        1. Given your own findings that coupled rows are absent in post-2019 DRAM, please provide a compelling argument for the forward-looking relevance of this work. Why should the security community be concerned about a vulnerability that appears to have been unknowingly fixed by manufacturers years ago?

        2. The claim that Marionette can bypass isolation-based defenses like Siloz is not supported by any experiment. You must either provide concrete data demonstrating a successful cross-VM or host-VM attack in a Siloz-like environment or remove these claims entirely from the paper. Speculation is not a substitute for evidence.

        3. Can you provide stronger evidence that the physical address MSB consistently maps to the coupled-row bit across a wider and more diverse range of systems (e.g., different CPU vendors, DIMM configurations, motherboards)? How sensitive is this mapping to BIOS settings for memory interleaving?

        4. Regarding the successful bypass of SoftTRR, can you provide more quantitative details beyond a binary success/failure outcome? For instance, what was the required hammer count, and how does this compare to HCfirst values measured on the FPGA?

        5. Please justify the use of an ECC-disabled system for your primary exploit. How do you expect the attack's success rate and feasibility to change on a modern, ECC-enabled server, where single-bit flips are corrected and multi-bit flips within a word are required?

        1. K
          In reply tokaru:
          Karu Sankaralingam @karu
            2025-11-02 17:17:57.873Z

            Reviewer: The Synthesizer (Contextual Analyst)

            Summary

            This paper introduces "Marionette," a novel and elegant RowHammer attack vector that weaponizes the "coupled-row" phenomenon present in certain DRAM modules. The core insight is that in these modules, two physically distant DRAM rows are connected to the same wordline, causing them to be activated simultaneously. This behavior is transparent to the processor and operating system, which see two distinct row addresses. The authors demonstrate that this architectural curiosity is a significant security vulnerability.

            Marionette exploits this "row coupling" to bypass the fundamental assumption of physical adjacency that underpins entire classes of software-based RowHammer defenses. By hammering an accessible row, an attacker can puppeteer its coupled partner inside a protected or isolated memory region, turning it into a "remote" aggressor. The paper provides a thorough characterization of coupled-row behavior, demonstrates a full end-to-end privilege escalation exploit that bypasses SoftTRR (a state-of-the-art tracking-based defense), and shows how the technique can significantly boost the success rate of conventional attacks. Finally, the authors propose practical modifications to existing software defenses to mitigate this new threat.

            Strengths

            1. Fundamental Contribution to the Field: The paper's primary strength lies in identifying and exploiting a vulnerability in the assumptions of the defense literature, not just an implementation flaw. The idea that RowHammer's effects are strictly local to an aggressor is a cornerstone of software mitigations. By demonstrating a practical way to violate this locality, this work forces a necessary re-evaluation of how we model and defend against RowHammer. It brilliantly connects a low-level circuit characteristic, previously noted in works like [44, 45], to a high-level security failure.

            2. Clear and Powerful Attack Concept: The "Marionette" attack is conceptually clean and highly effective. The analogy of a puppet is perfectly suited and aids understanding. The core mechanism—hammering a row in user space to induce bitflips from a coupled row located in a protected region (e.g., adjacent to page tables)—is an elegant way to bypass defenses like SoftTRR that monitor accesses based on physical address proximity. The diagrams, particularly Figure 5 (page 8), are excellent at conveying this core concept.

            3. Strong Empirical Validation: The authors provide compelling evidence to support their claims. The work is not merely theoretical. They begin with a careful, FPGA-based characterization to show that hammering a coupled row produces bitflips nearly identical in location and magnitude to hammering the aggressor row directly (Section 4.1, page 5-6). This establishes the foundational viability of the attack. The subsequent end-to-end exploit on a real server protected by SoftTRR (Section 8, page 9) provides undeniable proof of the attack's practicality and elevates the paper's impact significantly.

            4. Forward-Looking and Constructive Mitigation Strategy: The paper does not simply present a new attack; it also charts a path forward. The proposed mitigations in Section 9 (page 11) are pragmatic and well-reasoned. The idea of exposing the coupled-row relationship via the DRAM module's SPD chip to the OS is a simple yet powerful hardware-software contract. This allows existing software defenses like Siloz and SoftTRR to be "patched" with awareness of these non-local relationships, rather than requiring a complete redesign. This constructive approach is a hallmark of high-quality systems security research.

            Weaknesses

            1. Limited Scope of Affected Hardware: The paper notes that the authors were unable to find coupled rows in DIMMs manufactured after 2019 (Section 3.2, page 5 and Section 10, page 11). While the authors rightly argue that the underlying circuit optimization could reappear, this finding somewhat limits the immediate, widespread impact of the attack on the newest generation of hardware. The work's primary relevance is therefore as a crucial lesson for future hardware designs and a threat to a significant, but aging, fleet of servers.

            2. Conceptual Bypass of Isolation Defenses: While the end-to-end exploit against the tracking-based SoftTRR is a major strength, the bypass of the isolation-based Siloz is presented conceptually (Section 7.2, page 8). The logic is sound, and the authors are transparent about the complexity of demonstrating it in a multi-DIMM setup. However, the lack of an empirical demonstration makes this part of the contribution slightly less impactful than the successful SoftTRR attack.

            Questions to Address In Rebuttal

            1. Regarding the prevalence of coupled rows, the paper notes they were not found in post-2019 DIMMs. Could the authors elaborate on why they believe this might be the case? Is it possible that manufacturers have explicitly abandoned this design due to security concerns, or could the coupling mechanism have evolved to be harder to detect? A more detailed discussion on the long-term relevance of this phenomenon would strengthen the paper.

            2. The bypass of Siloz is a compelling idea. Could the authors comment on the specific technical hurdles that prevented a practical demonstration? For instance, does identifying the complex address mappings in a multi-channel, multi-DIMM server pose an insurmountable barrier for an attacker in practice, or was this primarily an engineering effort constraint?

            3. The paper's analysis suggests that future hardware defenses like PRAC, if implemented at the wordline-level, would be effective against Marionette (Section 10, page 12). Does this imply that any hardware defense that operates at the wordline granularity (e.g., counting activations, delaying accesses) would inherently mitigate this attack, simply because the two coupled rows are indistinguishable from that perspective? Clarifying this would help position Marionette within the broader context of the ongoing attack/defense co-evolution.

            1. K
              In reply tokaru:
              Karu Sankaralingam @karu
                2025-11-02 17:18:08.417Z

                Paper Title: Marionette: A RowHammer Attack via Row Coupling
                Reviewer Persona: The Innovator (Novelty Specialist)


                Summary

                This paper introduces "Marionette," a RowHammer attack that leverages the recently discovered hardware phenomenon of "row coupling" in certain DRAM modules. The core idea is that activating one DRAM row (from the processor's perspective) simultaneously activates a second, physically distant row. The authors are not the first to discover this phenomenon, but they claim to be the first to weaponize it. They demonstrate that by hammering a row under their control, they can indirectly hammer its coupled-pair row, which may reside in a protected or monitored memory region. This technique is used to construct an attack that bypasses two major classes of software-based RowHammer defenses: tracking-based (e.g., SoftTRR) and, conceptually, isolation-based (e.g., Siloz). The authors provide an end-to-end demonstration of a privilege escalation exploit on a server protected by SoftTRR and quantify the attack's ability to enhance conventional RowHammer success rates.

                Strengths

                The primary strength of this paper lies in its successful translation of a known hardware artifact into a potent, demonstrated security attack vector. My evaluation of novelty is as follows:

                1. Novel Application of a Known Phenomenon: The authors are transparent that the existence of coupled rows is not their discovery, properly citing prior work [28, 44, 45]. However, where prior work (notably [45] from members of the same group) characterized the phenomenon and only "briefly discussed" its exploit potential (Section 1, page 2), this paper provides the first complete, end-to-end weaponization. This leap from a hardware characterization study to a fully realized attack that bypasses state-of-the-art defenses is a significant and novel contribution in the security domain.

                2. Novel Bypass Mechanism: The core mechanism of the Marionette attack—using a physically-linked but logically-separate row to evade software monitoring—is a novel instantiation of a stealthy attack. While the general concept of finding ways to trigger hardware faults without being monitored is not new, the use of row coupling for this specific purpose in the context of RowHammer is. It cleverly exploits the abstraction gap between the OS's view of memory (based on physical addresses) and the DRAM's internal physical reality.

                3. Systematic Evaluation of the Novel Attack: The paper doesn't just propose the attack; it provides a systematic evaluation that validates its novelty. The characterization in Section 4.1, which shows that coupled-row hammering is nearly identical in effect to conventional hammering, is crucial work that establishes the new attack primitive as being as powerful as the original.

                Weaknesses

                My critique focuses exclusively on the boundaries of the paper's novelty and where the claims might overstate the conceptual advance.

                1. Contribution is Application, Not Discovery: The most significant weakness, from a pure novelty standpoint, is that the foundational mechanism is not new. The paper's contribution is entirely contingent on the prior discovery of coupled rows. While the authors' application is novel, the work should be framed carefully as a security implication study of a known hardware feature, rather than the discovery of a new class of hardware vulnerability from first principles.

                2. Conceptual vs. Demonstrated Novelty: The claim of bypassing isolation-based defenses like Siloz remains conceptual. As stated in Section 7.2 (page 9), "we did not execute a RowHammer attack on Siloz." While the reasoning for how a bypass would work is sound, the lack of a demonstration means this part of the claimed novel contribution is unsubstantiated. A truly novel work would have included this, given its importance.

                3. Incremental Enhancement Claim: The contribution detailed in Section 8.3 ("Enhancing Conventional Attacks") feels incremental. Using coupled rows to double the number of victim rows for a given set of aggressor activations is a direct and somewhat obvious consequence of the row coupling phenomenon. While the 1.66x quantitative result is useful, the underlying idea is not a paradigm shift but rather an optimization of an existing attack.

                Questions to Address In Rebuttal

                1. Clarifying the Delta from Prior Art: The introduction (Section 1, page 2) states that the exploit possibility of a coupled row was "briefly discussed in prior work [45]." To precisely establish the novelty of this paper, could the authors please elaborate on the exact extent of this prior discussion? What specific attack vectors or defense bypasses, if any, were hypothesized in [45]? This is critical for the committee to understand the true delta of this work.

                2. Generalizability of the Novel Mapping: The attack's feasibility seems to rely on a relatively simple mapping where the PA's MSB defines the coupled pair (Section 5.2, page 7). Is this a fundamental property of row coupling, or an artifact of the tested systems? How would the feasibility of identifying and exploiting coupled rows change if the coupling bit were interleaved in a more complex, proprietary address mapping scheme? The novelty of the attack is stronger if it is not dependent on this convenient mapping.

                3. Longevity of the Novelty: The paper notes that coupled rows were not found in the DIMMs they tested that were manufactured after 2019 (Section 3.2, page 5). This suggests the core phenomenon enabling this novel attack may already be obsolete in new hardware. Is the primary contribution here the demonstration of an attack on legacy systems, or can the authors provide a compelling argument or evidence (e.g., from circuit design principles) that such cost-saving design choices are likely to reappear in future DRAM generations (e.g., DDR5/6 or HBM3/4)?