BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.cccv.de//congress/2024/fahrplan//USSKAN
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-38c3-33YLTY@cfp.cccv.de
DTSTART;TZID=CET:20241230T120000
DTEND;TZID=CET:20241230T124000
DESCRIPTION:The density of memory cells in modern DRAM is so high that dist
 urbance errors\, like the Rowhammer effect\, have become quite frequent. A
 n attacker can exploit Rowhammer to flip bits in inaccessible memory locat
 ions by reading the contents of nearby accessible memory rows. Since its d
 iscovery in 2014\, we have seen a cat-and-mouse security game with a conti
 nuous stream of new attacks and new defenses. Now\, in 2024\, exactly 10 y
 ears after Rowhammer was discovered\, it is time to look back and reflect 
 on the progress we have made and give an outlook on the future. Additional
 ly\, we will present an open-source framework to check if your system is v
 ulnerable to Rowhammer.
DTSTAMP:20241227T122330Z
LOCATION:Saal 1
SUMMARY:Ten Years of Rowhammer: A Retrospect (and Path to the Future) - Dan
 iel Gruss\, Martin Heckel\, Florian Adamsky
URL:https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/33YLTY/
END:VEVENT
END:VCALENDAR
