USENIX Security '25 ECC.fail Artifacts
Authors/Creators
Description
# Artifacts for ECC.fail
This folder contains related files for the paper *ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory*. Please refer to the README.md file in each folder for specific instructions.
1. blacksmith: Blacksmith fuzzer
2. U-TRR: FPGA tools using DRAM-Bender to reverse engineer TRR implementations
3. ecc-scramber: Reverse engineered ECC matrices (encoding, parity checking, data extracting) and data scrambling strings
4. fwtools: Program to introspect and modify many different UEFI images
5. e2e: End-to-end Rowhammer attack code (bitflips & RSA)
Files
ecc.fail.artifact-v1.zip
Files
(2.3 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:6327d07f978e981162f964ed63052ce7
|
2.3 MB | Preview Download |