Published June 2, 2025 | Version v1
Software Open

USENIX Security '25 ECC.fail Artifacts

  • 1. ROR icon Georgia Institute of Technology
  • 2. University of Michigan
  • 3. ROR icon Purdue University West Lafayette
  • 4. ROR icon Ruhr University Bochum

Description

# Artifacts for ECC.fail

This folder contains related files for the paper *ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory*. Please refer to the README.md file in each folder for specific instructions.

1. blacksmith: Blacksmith fuzzer

2. U-TRR: FPGA tools using DRAM-Bender to reverse engineer TRR implementations

3. ecc-scramber: Reverse engineered ECC matrices (encoding, parity checking, data extracting) and data scrambling strings

4. fwtools: Program to introspect and modify many different UEFI images

5. e2e: End-to-end Rowhammer attack code (bitflips & RSA)

Files

ecc.fail.artifact-v1.zip

Files (2.3 MB)

Name Size Download all
md5:6327d07f978e981162f964ed63052ce7
2.3 MB Preview Download