#ESORICS25

Florian A.c1t
2025-09-24

@lunkw1ll presented our second paper at with the title "Verifying DRAM Addressing in Software". In this paper we show a novel way to verify DRAM addressing that were before reverse-engineered, for their correctness - without physical probing. We also found rank addressing functions with this approach. Additionally, an attacker can utilize the row conflict covert channel on DDR5 and exploit it for website fingerprinting attacks. You will find the paper here: florian.adamsky.it/research/pu

Martin gives a presentation.
Florian A.c1t
2025-09-22

@lunkw1ll presented our paper with the title "Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity" at . The problem that we see there is lack of real-world attacks which contradicts the number of Rowhammer publications from academia. For more info, you will find a pre-print of our paper here: florian.adamsky.it/research/pu

Martin sits on the stage and presents our paper at ESORICS25
Florian A.c1t
2025-09-20

I am packing for my trip tomorrow to Toulouse for 30th European Symposium on Research in Computer Security (#ESORICS25). We are presenting two papers there about our research—another great collaboration with @lavados and his team.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst