Score: 2

Thunderhammer: Rowhammer Bitflips via PCIe and Thunderbolt (USB-C)

Published: September 14, 2025 | arXiv ID: 2509.11440v1

By: Robert Dumitru , Junpeng Wan , Daniel Genkin and more

Potential Business Impact:

Lets bad devices change computer memory.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

In recent years, Rowhammer has attracted significant attention from academia and industry alike. This technique, first published in 2014, flips bits in memory by repeatedly accessing neighbouring memory locations. Since its discovery, researchers have developed a substantial body of work exploiting Rowhammer and proposing countermeasures. These works demonstrate that Rowhammer can be mounted not only through native code, but also via remote code execution, such as JavaScript in browsers, and over networks. In this work, we uncover a previously unexplored Rowhammer vector. We present Thunderhammer, an attack that induces DRAM bitflips from malicious peripherals connected via PCIe or Thunderbolt (which tunnels PCIe). On modern DDR4 systems, we observe that triggering bitflips through PCIe requests requires precisely timed access patterns tailored to the target system. We design a custom device to reverse engineer critical architectural parameters that shape PCIe request scheduling, and to execute effective hammering access patterns. Leveraging this knowledge, we successfully demonstrate Rowhammer-induced bitflips in DDR4 memory modules via both PCIe slot connections and Thunderbolt ports tunnelling PCIe.

Country of Origin
πŸ‡¦πŸ‡Ί πŸ‡ΊπŸ‡Έ United States, Australia

Repos / Data Links

Page Count
13 pages

Category
Computer Science:
Cryptography and Security