{"id":670293,"date":"2020-07-08T03:00:58","date_gmt":"2020-07-08T10:00:58","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?p=670293"},"modified":"2020-07-08T09:31:48","modified_gmt":"2020-07-08T16:31:48","slug":"defending-dram-for-data-safety-and-security-in-the-cloud-with-dr-stefan-saroiu","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/research\/podcast\/defending-dram-for-data-safety-and-security-in-the-cloud-with-dr-stefan-saroiu\/","title":{"rendered":"Defending DRAM for data safety and security in the cloud with Dr. Stefan Saroiu"},"content":{"rendered":"<h3><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-670308\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1024x577.png\" alt=\"head shot of Dr. Stefan Saroiu for the Microsoft Research Podcast\" width=\"1024\" height=\"577\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1024x577.png 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-300x169.png 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-768x432.png 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1536x865.png 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-2048x1153.png 2048w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1066x600.png 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-655x368.png 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-343x193.png 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-640x360.png 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-960x540.png 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1280x720.png 1280w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1920x1080.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/h3>\n<h3>Episode 120 | July 8, 2020<\/h3>\n<p>Dynamic random-access memory \u2013 or DRAM \u2013 is the most popular form of volatile computer memory in the world but it\u2019s particularly susceptible to Rowhammer, an adversarial attack that can cause data loss and security exploits in everything from smart phones to the cloud.<\/p>\n<p>Today, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\">Dr. Stefan Saroiu<\/a>, a Senior Principal Researcher in MSR\u2019s <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/mobility-and-networking-research\/\">Mobility and Networking group<\/a>, explains why DRAM remains vulnerable to Rowhammer attacks today, even after several years of mitigation efforts, and then tells us how a new approach involving bespoke extensibility mechanisms for DRAM might finally hammer Rowhammer in the fight to keep data safe and secure.<\/p>\n<h3>Related:<\/h3>\n<ul type=\"disc\">\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/podcast\">Microsoft Research Podcast<\/a>: View more podcasts on Microsoft.com<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/microsoft-research-a-podcast\/id1318021537?mt=2\">iTunes<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>: Subscribe and listen to new podcasts each week on iTunes<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/subscribebyemail.com\/www.blubrry.com\/feeds\/microsoftresearch.xml\">Email<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>: Subscribe and listen by email<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/subscribeonandroid.com\/www.blubrry.com\/feeds\/microsoftresearch.xml\">Android<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>: Subscribe and listen on Android<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/open.spotify.com\/show\/4ndjUXyL0hH1FXHgwIiTWU\">Spotify<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>: Listen on Spotify<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.blubrry.com\/feeds\/microsoftresearch.xml\">RSS feed<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/note.microsoft.com\/ww-registration-microsoft-research-newsletter-s.html?wt.mc_id=S-webpage_podcast\">Microsoft Research Newsletter<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>: Sign up to receive the latest news from Microsoft Research<\/li>\n<\/ul>\n<hr \/>\n<h3>Transcript<\/h3>\n<p>Stefan Saroiu:\u00a0So our philosophy is that what we would like to see in the standard,\u00a0rather than describing\u00a0<i>the<\/i>\u00a0solution for Rowhammer, what we would like to see is describing extensibility mechanisms that companies, hardware vendors, can implement their favorite form of mitigations, the one that works best for their particular type of memory by leveraging these extensions.<\/p>\n<p><b>Host:\u00a0<\/b><b>You\u2019re listening to the Microsoft Research Podcast, a show that brings you closer to the cutting-edge of technology research and the scientists behind it. I\u2019m your host, Gretchen Huizinga.<\/b><\/p>\n<p><b>Host:\u00a0<\/b><b>Dynamic\u00a0<\/b><b>r<\/b><b>andom<\/b><b>-a<\/b><b>ccess\u00a0<\/b><b>m<\/b><b>emory \u2013 or DRAM \u2013 is the most popular form of volatile computer memory in the world but it\u2019s particularly susceptible to Rowhammer, an adversarial attack that can cause data loss and security exploits in everything from smart phones to the cloud.<\/b><\/p>\n<p><b>Today, Dr. Stefan Saroiu, a Senior Principal Researcher in MSR\u2019s Mobility and Networking group, explains why DRAM remains vulnerable to Rowhammer attacks, even after several years of mitigation efforts, and then tells us how a new approach involving bespoke extensibility mechanisms for DRAM might finally hammer Rowhammer in the fight to keep data safe and secure.<\/b><b>\u00a0<\/b><b>That and much more on this episode of the Microsoft Research Podcast.<\/b><\/p>\n<p><b>Host: Stefan Saroiu, welcome to the podcast.<\/b><\/p>\n<p>Stefan Saroiu: Thank you, Gretchen. It\u2019s great to be here.<\/p>\n<p><b>Host: Some of my favorite people on the planet are working on making things work for us and you\u2019re one of those people. So, first, thanks.\u00a0<\/b><b>As we begin though,\u00a0<\/b><b>let\u2019s talk about your people for a minute. You\u2019re a Senior Principle Researcher in the Mobility and Networking group, which isn\u2019t totally separate from Systems and Networking, but they\u2019re not totally the same either. So, give us a verbal Venn diagram of the two groups, why they exist, where they\u2019re different and where they overlap, and how, in broad strokes, each of them is working to make our lives better.<\/b><\/p>\n<p>Stefan Saroiu: Yes, thank you for the kind words, Gretchen. So back in the day, Microsoft Research had a single Systems and Networking group and as the group got larger, the group split into several smaller groups like the Systems group, the Security group, the Distributed Systems group and the Mobility and Networking group. But we\u2019re all systems researchers at the end of the day, whether we work on operating systems or networks or mobile systems or on distributed systems. So, I\u2019m part of the Mobility and Networking group.\u00a0But over my research career, my work has focused on systems, both in terms of mobile systems and networking systems. And for\u00a0the past couple of years, these systems that I\u2019ve been working on aim to improve the security of users and the security of infrastructure.<\/p>\n<p><b>Host: Let\u2019s get specific and talk about the work you do within the\u00a0<\/b><b>M<\/b><b>obility and\u00a0<\/b><b>N<\/b><b>etworking group now. So, sort of in general, what big problems are you trying to solve as a researcher and, and maybe more importantly, why does the world need you to solve them? What gets you up in the morning?<\/b><\/p>\n<p>Stefan Saroiu: So, I do two kinds of work. The first kind is creative work because I really value creativity very highly and I believe it\u2019s very difficult to come up with\u00a0a truly\u00a0creative idea. The second kind of work that I do is driven by intellectual curiosity and by revisiting assumptions or turning them on their head. And I strongly believe that the role of an expert is to break preconceived assumptions and rules. Unfortunately, you have to be an expert first. In fact, trying to break assumptions before understanding deeply an area and a problem is a very bad idea. So, I\u2019ve been working on secure systems research for almost a decade now. We built a secure network tracing system that offers very strong privacy. So, for example, network operators can monitor their networks in a way that all the sensitive data is locked down without anybody being able to subvert it or use it in any ways other than originally intended.\u00a0We built sensors that can attest that\u00a0information is correct and has not been manipulated or changed. So, as a simple example, consider a photo where one can check whether the photo has been photoshopped or is indeed captured by a proper camera. Then I worked on a secure payment system called Zero-Effort Payments, that was a little like the precursor of Amazon Go Store. So, our system was a little different in that, you\u2019d pick up the food and you\u2019d go through a cashier who\u2019d ring you up, but you\u2019d not have to do any explicit thing to actually pay. The system would know who you are, and since you\u2019d\u00a0have to pre-register with the system and the payment would be processed. So, I\u2019ve worked on all these things. I also worked on a firmware TPM, which brings trusted computing to mobile devices and it works in millions of smart phones\u00a0and tablets today.<\/p>\n<p><b>Host: Mmm.<\/b><\/p>\n<p>Stefan Saroiu: But for the past couple of years, I\u2019ve worked on Azure security in particular, and we started a project called Project STEMA. STEMA stands for Secure Trustworthy\u00a0and\u00a0Enhanced Memory for Azure and we\u2019ve been focusing a lot on Rowhammer attacks.<\/p>\n<p><b>Host: Well, let\u2019s talk about memory and computer memory specifically\u2026<\/b><\/p>\n<p>Stefan Saroiu: Yeah.<\/p>\n<p><b>Host: \u2026<\/b><b>\u00a0<\/b><b>since<\/b><b>\u00a0<\/b><b>it\u2019s a foundational storage unit for digital data, but there are many kinds of containers,<\/b><b>\u00a0<\/b><b>as you well know,\u00a0<\/b><b>so let\u2019s do a quick primer for the flavor that we\u2019re\u00a0<\/b><b>really most<\/b><b>\u00a0interested in today, which is DRAM.\u00a0<\/b><b>So, how does it work physically? What are its vulnerabilities, both internally and externally? And you don\u2019t need to get ridiculously granular here because I saw your\u00a0<\/b><b>hundred and fourteen<\/b><b>-page deck and\u00a0<\/b><b>a hundred<\/b><b>\u00a0pages of\u00a0<\/b><b>it is explaining DRAM! No, I\u2019m kidding<\/b><b>\u2026<\/b><b>\u00a0<\/b><b>D<\/b><b>on\u2019t be afraid to get as technical as you need to set the problem up.<\/b><\/p>\n<p>Stefan Saroiu: Okay. So, DRAM is the world\u2019s most popular form of volatile memory. Pretty much every form of computing out there has DRAM. You can find DRAM in smart phones, in tablets, in PCs\u2026 You can find DRAM in cars. You can find DRAM in washing machines. And a DRAM cell stores a\u00a0zero or a one,\u00a0and it does that by using a very simple circuit with one capacitor. And a capacitor can be charged or discharged,\u00a0and that can mean a\u00a0one\u00a0or a\u00a0zero. So, for example, if you want to\u00a0store the\u00a0value\u00a0one\/zero\/one\/zero, you just sort of have four cells and you have one charge capacitor and one discharge capacitor, one charge and one discharge and you encode\u00a0one\/zero\/one\/zero\u00a0that way. Now, capacitors leak over time. They sort of lose their charge over time. So, DRAM has to continuously refresh these capacitors. And the cells are built to maintain their charge for a small period of time, say something like\u00a0sixty four\u00a0milliseconds, and the contract is that the hardware has to make sure that every single cell in its DRAM is refreshed once within\u00a0sixty four\u00a0milliseconds and in that way the cell maintains its data, its charge.\u00a0Now, DRAM cells are organized in rows and columns and when you read a value from DRAM, you read by row,\u00a0and the way you read this is by switching some transistors in such a way that the capacitors are then coupled with some sensors. So, the sensors sense whether these capacitors are charged or discharged and then they can translate that into data. Now, unfortunately what\u2019s happening is that when you actually sense the data on the capacitors, it turns out that rows located in the vicinity, in the adjacency, of this row you\u2019re trying to read, those capacitors also get affected and they get affected by having them discharge faster than normal. And this phenomenon is called a DRAM Disturbance Error because,\u00a0by causing them to discharge faster within a\u00a0sixty-four-millisecond period, you lose the content of that cell and in some sense the bit flips that way.\u00a0And\u00a0the bit that flips is one that you never actually meant to read or access before. Maybe you don\u2019t even have control over it. Maybe it\u2019s some other software component that controls it.<\/p>\n<p><b>Host: Okay.<\/b><\/p>\n<p>Stefan Saroiu: So that\u2019s where sort of the concern lies.<\/p>\n<p><b>Host: Right.<\/b><\/p>\n<p>Stefan Saroiu:\u00a0In the DRAM space, there\u00a0is this Rowhammer attack and the contract, from day one when you build any system, any software system, anything you want, any computer, the contract is that if you give me a piece of memory, when I write something to it, I want to be able to read what I wrote. And with Rowhammer, you violate this very simple contract. You read a different value than the one you wrote. And, doing that you can basically exploit systems in ways that are unimaginable before.<\/p>\n<p><b>Host: Well, since we\u2019re talking about\u00a0<\/b><b>Rowhammer\u00a0<\/b><b>right\u00a0<\/b><b>now, let\u2019s move into i<\/b><b>t.\u00a0<\/b><b>A<\/b><b>s you put it once, it\u2019s one of the hottest research topics in the security research community. So<\/b><b>,<\/b><b>\u00a0give\u00a0<\/b><b>us a level<\/b><b>&#8211;<\/b><b>set. What is\u00a0<\/b><b>Rowhammer<\/b><b>, specifically, and why, particularly, does it make\u00a0<\/b><b>cloud<\/b><b>\u00a0providers and server farmers nervous?<\/b><\/p>\n<p>Stefan Saroiu: So, I described\u00a0this\u00a0DRAM Disturbance Errors effect and this effect gets worse as DRAM gets denser and denser and we want DRAM to get denser and denser because that\u2019s how we store more capacity, that\u2019s how we build better DRAM. But the phenomenon gets worse, this DRAM Disturbance Error.\u00a0A Rowhammer attack, it\u2019s an attack in which an adversary generates a workload that exploits disturbance errors to flip the value of bits that have critical importance to the security of the system.\u00a0Like for example, bits that form a secret key. And cloud vendors are very nervous because the entire business model is one where you have multiple parties share your hardware. In particular, in this case, they share your memory. They share your DRAM. Well, what if one of these customers becomes rogue?\u00a0They themselves get exploited\u00a0through\u00a0some other attack. Can they attack other customers by flipping bits in their memory? And yes, they can attack it in very devastating ways.<\/p>\n<p><b>Host: How did Rowhammer get its name? Is it because of the rows in the DRAM?<\/b><\/p>\n<p>Stefan Saroiu: I was explaining how,\u00a0when you access a row, an adjacent row gets affected by that,\u00a0and the attack, in order to create this disturbance error, what you have to do is you have to keep accessing that row over and over and over again and that\u2019s the term\u00a0hammering the row. And the attack got this name Rowhammer.<\/p>\n<p><b>Host: So, if I\u2019m an attacker, am I trying to do something specific or am I just trying to mess you up?<\/b><\/p>\n<p>Stefan Saroiu: Oh, that\u2019s a great question. Depends, right? So, as a cloud provider, cloud providers are nervous about both scenarios. A Rowhammer attack in general refers to flipping a security-critical bit,\u00a0so by flipping that bit, I\u2019m trying to target something specifically. I\u2019m trying to exploit something. However, the simpler, and in fact, the likelier form of attack is one where I\u2019m just messing up the bits. And systems, actually, today in the cloud, they\u2019re pretty good at detecting when these bits are messed up, but if the bits are messed up, there\u00a0is just very little we can do about that.\u00a0I see these bits and I\u2019ve encoded enough redundancy in the data to know that they\u2019re messed up, but I can\u2019t recover to where I was before.<\/p>\n<p><b>Host: Right.<\/b><\/p>\n<p>Stefan Saroiu: And\u00a0there is\u00a0really not a good way to solve that problem.\u00a0Once the bits have flipped, it\u2019s like I can\u2019t go back,\u00a0and the best thing I can hope for is maybe reboot the server and let\u2019s start all over again. And that\u2019s also very, very bad for a cloud customer because there are a lot of workloads in the cloud that have a lot of data\u00a0in\u00a0memory, they do a lot of computation, maybe they train a machine learning model and then, you know, for many, many days, and at some point you say, oh, sorry, guys, you have to start all over again because we\u2019ve\u00a0messed it up.<\/p>\n<p><b><i>(music plays)<\/i><\/b><\/p>\n<p><b>Host: Before we dive into the technical aspects of your research on the Rowhammer threat, I find this whole drama really fascinating and I think it would be good to set the stage and the cast of characters. We\u2019ve talked about cloud providers. Who are the other players? Who provides to the providers and what\u2019s their motivation? Who sets and guards the standards, and finally, who\u2019s got an eye on everybody?<\/b><\/p>\n<p>Stefan Saroiu: It\u2019s a fascinating landscape. Microsoft is a cloud provider and I started with cloud providers because part of our role at Microsoft Research is also to make the cloud better. There are several other players,\u00a0and one big\u00a0players\u00a0are the companies that sell DRAM.\u00a0And when the attack was first described or published, which was in 2014, the hardware vendors jumped to quickly dismiss these concerns. It\u2019s,\u00a0we knew\u00a0about\u00a0Rowhammer, but that\u2019s a problem that\u00a0that\u00a0older type of memory has. The newer type of memory, it doesn\u2019t have this problem anymore. And in fact, there are quotes online where vendors claim that DDR4, which is the memory that we always use today, is Rowhammer-free. And of course, researchers have shown over and over again that DDR4 is not Rowhammer-free and then they said, oh, yes, but then you should buy this newer DDR4 that has\u00a0a\u00a0form of defense called TRR and just this year, earlier, there was a wonderful paper from an academic group in the Netherlands that showed a huge number of DDR4 DRAM with this form of defense TRR being vulnerable by slightly changing the form of the attack, okay?\u00a0So basically\u00a0what the vendors have done is they\u2019ve patched the old way of mounting the attack, but they haven\u2019t told anyone how they patched it and you just have to sort of try different things until one of the new things clicks and then you can bypass those defenses. So, now we have\u00a0the cloud providers, the DRAM vendors and then the security and research community. And there is this feeding loop where that the DRAM vendors say,\u00a0oh,\u00a0yeah,\u00a0we knew about it.\u00a0The new memory is safe. Give it a year or two. The security and research community says, oh, it\u2019s not safe\u2026 and sort of the cloud providers and the smart phone manufacturer as well, are caught in the middle.<\/p>\n<p><b>Host: So Rowhammer is a problem. It\u2019s a big one, and it hasn\u2019t been ignored, but it hasn\u2019t been solved either. So, when we talked before, you said that more than forty papers\u2026<\/b><\/p>\n<p>Stefan Saroiu: Oh, yeah.<\/p>\n<p><b>Host: \u2026have been published on this subject and DRAM still remains as vulnerable as ever. So, what has the academic community done to date to try to solve the Rowhammer problem, and what, to date, have they got right\u00a0<\/b><b>and<\/b><b>\u00a0got wrong?<\/b><\/p>\n<p>Stefan Saroiu: Right, so there\u2019s sort of two bodies of work in academia. One is the security research community. And then there is the computer architecture community,\u00a0and to give them credit, actually, the\u00a0computer architecture community were the first ones to show this problem to sort of raise the flag saying, hey, we have a DRAM\u00a0Disturbance\u00a0Error. And the architecture community has been very good at putting forward the whole bunch of Rowhammer mitigation\u00a0proposals. However, all these proposals, they come with trade-offs and implementing one of these mitigations inside of DRAM will make that DRAM ultimately more expensive in some way. Maybe it will decrease the density, maybe the DRAM vendors will have to add extra memory or\u00a0extra sort of\u00a0counters to keep track of who\u2019s accessing what. And the market forces in the DRAM world are in such a way that they need to use every single piece of real estate they have to just cram more and more cells. And\u00a0that\u2019s where the security research community comes in where they keep sort of reverse engineering and\u00a0trying\u00a0different things and they\u2019ve\u00a0found ways to go around those mitigations and show new forms of attack. So, to be fair to them, it\u2019s sort of also a business thing. Like I said, people knew about Rowhammer and there were discussions in their sort of standardization body\u00a0\u2013\u00a0that is an organization called JEDEC where a lot of hardware vendors and software companies actually participate\u00a0\u2013 there\u2019s been a lot of discussion over the years on implementing a solution and in fact, that\u2019s what they\u2019re doing now. There won\u2019t be a single solution for Rowhammer that will work for every single type of memory out there and for which every single hardware vendor will be willing to actually implement.\u00a0So our philosophy is that what we would like to see in the standard,\u00a0rather than describing\u00a0<i>the<\/i>\u00a0solution for Rowhammer, what we would like to see is describing extensibility mechanisms that companies, hardware vendors, can implement their favorite form of mitigations, the one that works best for their particular type of memory by leveraging these extensions.\u00a0So that\u2019s what we\u2019re trying to sort of change and shift.<\/p>\n<p><b>Host: In light of all that, Stefan, tell us about your most recent work that involves what you called an end-to-end methodology to help cloud providers determine if they\u2019re susceptible to Rowhammer because that\u2019s that upstream approach that you\u2019re talking about instead of the patch afterwards that\u2019s impossible. So in the context of our cast of characters<\/b><b>,<\/b><b>\u00a0and against the backdrop of computer memory solutions that have trust issues, tell us how you are attacking this, what your methodology is, how successful it is, and what are the key challenges\u00a0<\/b><b>that\u00a0<\/b><b>you face?<\/b><\/p>\n<p>Stefan Saroiu: So, what we\u00a0tried\u00a0to do was we\u00a0tried\u00a0to help the software company by building a systematic and scalable testing methodology to test whether your DRAM is susceptible to Rowhammer attack. And to build such a methodology, you have to overcome two practical challenges. You have to devise a sequence of instructions that your processor executes, that hammers the memory at the fastest possible rate. You want to create what we call the\u00a0\u201cworst-case testing conditions\u201d\u00a0for memory. The second thing you want to do, you want to know where you\u2019re hammering. Remember I was telling you how DRAM\u00a0disturbance occurs to rows that are adjacent to the row you\u2019re hammering. Well, the rows\u00a0that\u00a0are\u00a0adjacent are the worst affected, but even rows that are nearby are affected. So, a row that\u2019s\u00a0sort of two rows away,\u00a0like the next neighbor or something like that,\u00a0can be affected, but it\u2019s very difficult to affect a row that\u2019s very far somewhere inside of your array. So, you have to actually know, what is the row-by-row layout of your DRAM chip? And this is, in fact, a trade secret.\u00a0What we did was we built a hardware fault injector that allows us to\u2026 you can think of it like short-circuiting the memory in such a way that we can\u00a0actually\u00a0<i>always<\/i>\u00a0create these Rowhammer attacks by not letting the memory refresh itself. So, if you hammer a row and the memory never refreshes, you\u2019re going to\u00a0flip bits eventually because the capacitors will lose their charge. Then you go and study the patterns of how these bits have flipped and that tells you about the layouts of the cells inside of the DRAM. Because guess what? The row you hammered, most of the bits that flipped are going to be in\u00a0its\u00a0adjacent rows. And there will be some bits flipped in the next to the adjacent rows, and then fewer\u00a0bits\u00a0and so on, so you create these kind of heat maps so you can reverse, really, row-by-row adjacency by this form of short-circuiting the memory or sort of suppressing refresh commands.<\/p>\n<p><b>Host: Okay, so you\u2019re reverse engineering to find out what\u2019s going on?<\/b><\/p>\n<p>Stefan Saroiu: Yes,\u00a0we have a methodology\u2026\u00a0our methodology can reverse engineer every single DDR4\u00a0DIMM\u00a0in the world.\u00a0And\u00a0what you\u00a0actually\u00a0end up discovering when you\u2019re reverse engineering is that these maps change. They change from one vendor to another and they can also change from one DIMM to another depending on the DIMM\u2019s revision. It\u2019s called\u00a0Post\u00a0Packaging\u00a0Repair. So, we can actually also measure how many fixes that DRAM has had before it was shipped to you.<\/p>\n<p><b>Host: Okay<\/b><b>.\u00a0<\/b><b>S<\/b><b>o<\/b><b>\u00a0this methodology has to attack, for lack of a better word\u2026<\/b><\/p>\n<p>Stefan Saroiu: Yes, yes.<\/p>\n<p><b>Host: \u2026every vendor\u2019s particular proprietary chip\u2026<\/b><\/p>\n<p>Stefan Saroiu: Yes.<\/p>\n<p><b>Host: \u2026and within the vendors, there\u2019s different chips as well. So, you\u2019ve got a lot of things you have to be looking at. How\u2019s it working so far?<\/b><\/p>\n<p>Stefan Saroiu: Now, that\u2019s a great question. It\u2019s very difficult to test every single chip that a cloud provider has. So, instead what we\u2019re doing is we are mapping the DRAM fabrication process for different DRAM devices and for different vendors. And then\u00a0within those packets, we\u00a0sample\u00a0and we test.\u00a0And\u00a0we actually, what\u00a0we do,\u00a0we look at the trends. And we want to make sure that the workloads that we see in the cloud will not generate activations that will actually start flipping bits.<\/p>\n<p><b>Host: Right.<\/b><\/p>\n<p>Stefan Saroiu: Because I was telling you, the\u00a0DRAM gets worse over time, not better. So in fact, we can even, by waving our hands a little bit, we can predict how many years in the future it\u2019s going to be until we\u2019re going to see workloads reach a point where, just by using the memory, they\u2019re going to start flipping bits.\u00a0And it\u2019s our job to influence sort of a more principled approach to fixing the problem rather than a band-aid approach and also to keep an eye, not just for Microsoft, but the entire cloud industry,\u00a0as to at which point we\u2019ll have to do something to\u00a0make sure that the workloads are not going to actually start causing bit flips. So for example, one of the things you might want to do when you actually detect that a virtual machine starts accessing the memory in a way that might actually induce bit flips, you could try to slow it down or migrate it to a new DRAM or do something like that.<\/p>\n<p><b>Host: Yeah, so there\u2019s more solutions than just fixing the chip?<\/b><\/p>\n<p>Stefan Saroiu: Right.<\/p>\n<p><b>Host: There\u2019s other mitigations.<\/b><\/p>\n<p>Stefan Saroiu: In fact, I think the solutions will have to span the entire stack. There\u2019ll be some fixing the chip things, but those fixing the chips have to sort of be programmed or used by things higher up, both by the CPU and by the software.<\/p>\n<p><b>Host: Well, that leads\u00a0<\/b><b>well\u00a0<\/b><b>into the next question. There\u2019s a lot of people that need to be involved in this so, tell us a little bit about who you\u2019re working with as partners and what kinds of cooperative expertise do you need to solve for X in the systems security equation?<\/b><\/p>\n<p>Stefan Saroiu: None of these\u00a0works\u00a0I\u2019ve been describing is mine alone and in Microsoft Research, I\u2019ve worked with a small team of very talented people who have expertise that is very, very different than mine.\u00a0You know,\u00a0I come from a computer science background and I am not sort of equipped to short circuit memory or anything like that. And in fact, until a couple of years ago, I really didn\u2019t understand how DRAM works very well. So, we have that sort of expertise in Microsoft Research to basically build hardware prototypes that actually can inject these sort of failures into hardware, into the memory.<\/p>\n<p><b>Host: Okay.<\/b><\/p>\n<p>Stefan Saroiu: And then I also collaborate very strongly with a group of wonderful engineers in Azure. There is a group called the Next Cloud System Architecture,\u00a0or NCSA,\u00a0and these folks have decades of expertise\u00a0of\u00a0understanding how DRAM works. And working with JEDEC and working with the memory vendors and they\u2019ve been very good in two ways. One was in describing to us how memory works in ways that go beyond what the manual can teach you, and sort of what the concerns are and the limitations, and the forces that act when you actually build these circuits in practice. And the second way that they\u2019ve been very helpful was that,\u00a0when we interact with JEDEC,\u00a0and we try to sort of make the shift, they\u2019ve been very good at coaching us on how to put forward that proposal in a way that\u2019s more amenable.<\/p>\n<p><b>Host: Who are your other kind of big partnership associations? Are you working with other academics? Are you working with other industry? Are you working with other cloud providers?<\/b><\/p>\n<p>Stefan Saroiu: We\u2019re lucky that we have very strong collaborations with two top academic places. One is ETH Zurich and the other one is\u00a0at\u00a0Max Planck in Germany. And we are working closely with companies that can be massively affected by Rowhammer. When security researchers actually go and sort of find a new way to actually attack the memory, they go through a process that\u2019s called Responsible Disclosure. So, what that means is that they will not make their findings publicly available, but instead they\u2019re going to reach out to all the industry involved and describe their findings and give some time to the industry to form a response. And once this period has ended, then the research becomes public. So when these new forms of attacks came about, there was a group of companies formed that started looking at these problems again and the first thing that they had on their mind is,\u00a0like look,\u00a0you know,\u00a0so\u00a0we have these research results, but\u00a0can anybody go and independently validate them on their hardware?\u00a0So, we at Project STEMA were the first to\u00a0actually validate\u00a0these findings on server-grade hardware\u2026 hardware that is run in the data centers.<\/p>\n<p><b>Host: Right. Well, it sounds like you all have the same goals. You don\u2019t want things to break. You want things to work well. Ultimately, you want customers to have safe data and things not to break\u2026<\/b><\/p>\n<p>Stefan Saroiu: We do,\u00a0and in fact, I was mentioning how, for Rowhammer and for testing memory, understanding row by row adjacency is very, very important. And I also said how DRAM vendors do not want to reveal this information, okay? In fact, the extensibility mechanisms we proposed for people to build their own forms of Rowhammer mitigations, from the beginning, we designed them in a way where DRAM vendors do not have to tell anyone these adjacency maps.\u00a0In fact, there is a large swath of Rowhammer mitigations that people have proposed over the past five or six years that all rest on the assumption that the software company will have complete access to this information and these companies are very reluctant, so rather than mandating that,\u00a0or forcing them to do something they don\u2019t want to do, instead, we designed this with the assumption that hey, you guys don\u2019t have to tell us anything.\u00a0And we think that this has a much better likelihood of being adopted in practice and then again, not mandating the solution, letting people build their favorite solution for the kind of hardware they want to use. You know, the Rowhammer solution that you build for the DRAM in a server running in Azure is very, very different than the Rowhammer solution that you should build for an IoT\u00a0device that has a little bit of DRAM and runs a little bit of code.<\/p>\n<p><b><i>(music plays)<\/i><\/b><\/p>\n<p><b>Host: We\u2019ve reached the \u201cwhat could possibly go wrong?\u201d segment of the podcast where I ask all my guests what keeps them up at night<\/b><b>, and s<\/b><b>o, despite the fact that the majority of your work could actually be classified as a research response to what keeps us all up at night, sometimes the so-called solutions actually present new problems. So, do you have any concerns about the work you\u2019re doing and if so, how are you addressing them?<\/b><\/p>\n<p>Stefan Saroiu: My concern is, I was telling you how we have this hardware out there, whether it\u2019s DRAM, whether it\u2019s CPUs, whether it\u2019s, you know, chip sets, whether GPUs, so on and so forth, and this hardware is very, very complex and\u00a0one of the things that we\u2019ve learned is that in the quest of higher performance, we have designed this hardware in ways that can be exploitable, and these exploits are done in such a way that we never thought possible before and what keeps me up at night is, I don\u2019t really understand everything that\u2019s going on in a DRAM device. What if there\u2019s another way out there that you can actually mount these attacks in very, very simple ways? And unfortunately, with a cloud and with the consolidation of the entire computing power into data centers, I\u2019m concerned that we might have an event that wipes out\u00a0an\u00a0entire cloud, that wipes out, you know, a big part of our infrastructure, that shuts down the entire internet. And you know, we\u2019re going to have exploits and little things here and there. We\u2019ve always had those. We\u2019re going to continue to have them. But we\u2019ve\u00a0really never\u00a0had a single wipe out event. So, having a wipe out event would be quite, quite concerning.<\/p>\n<p><b>Host: So how are you thinking about that as a researcher? I mean, it\u2019s one of those giant problems\u00a0<\/b><b>which<\/b><b>\u00a0you think I can\u2019t possibly solve this, but are there any strategies that come into your head, given the kind of work you do, that say, hey, this is how we might try to mitigate such an event?<\/b><\/p>\n<p>Stefan Saroiu: It\u2019s a very hard problem. You\u2019re absolutely right. My part comes when it\u2019s about DRAM, because I understand DRAM better than many people,\u00a0and my part is to make sure that there won\u2019t be a wipe out event happening because of DRAM\u2026 From the point of view of DRAM, I hope that my work plays a role in that.<\/p>\n<p><b>Host: That\u2019s a beautiful way to frame it, Stefan, because as you point out, there\u2019s many fronts in this war against, you know, people that are working to keep things safe and secure and people that are working to tear things down. So, you say, hey, at least on my watch, the DRAM part is going to be good<\/b><b>!<\/b><\/p>\n<p>Stefan Saroiu: That\u2019s right.<\/p>\n<p><b>Host: I love that.<\/b><\/p>\n<p>Stefan Saroiu: That\u2019s right.<\/p>\n<p><b>Host: Well, I don\u2019t want to let you go before we talk a little bit about industry standards and the tension between gatekeepers and practitioners\u00a0<\/b><b>in<\/b><b>\u00a0a time when technical innovation is moving so fast that<\/b><b>\u00a0<\/b><b>regulatory bodies have a hard time keeping up. So, what are the key challenges to organizations like JEDEC in your field and how would you frame the role of these kinds of gatekeepers in the future?<\/b><\/p>\n<p>Stefan Saroiu: So, the industry is changing at a fantastic pace and the role of JEDEC was actually to standardize how memory is used. At least, let\u2019s talk about DRAM. They\u00a0actually standardize\u00a0things other than DRAM, but DRAM is a big part of it. And in the 80s and in the 90s, we needed that because we were building PCs and we had a massive number of stakeholders,\u00a0of people who were actually building all sorts of hardware components,\u00a0and you wanted these hardware components, when you put them in a box, to all work together. Now,\u00a0there is a little less of that. There\u2019s more of data centers and there\u2019s no need for the computers that Google puts in their data centers to make sure they work with the computers that Microsoft puts in their\u00a0data\u00a0centers. All they have to do is to offer a software platform that is common enough that people can actually use it.\u00a0But because we see this consolidation, I believe there is less of a need for standardization happening\u00a0because\u00a0if a cloud provider buys memory from three different vendors, all four parties can agree on how they build\u00a0their\u00a0hardware in using their data center. So, I believe we\u2019re going to see an increasing amount of fragmentation that way.<\/p>\n<p><b>Host: Well, so, what does an organization like JEDEC have to do to stay alive?<\/b><\/p>\n<p>Stefan Saroiu: I think JEDEC has to shift the way they view themselves as a specification of\u00a0what the\u00a0functionality of the hardware\u00a0is\u00a0to one that specifies mechanisms that are flexible enough to allow increasing amounts of innovation from the different stakeholders\u00a0in place.<\/p>\n<p><b>Host: Well, every researcher has a unique life story and it\u2019s time to hear yours, but I want to preface this by noting that you\u2019ve gone to the trouble of including what I would call a scholarly genealogy on your personal website,\u00a0<\/b><b>s<\/b><b>o we can trace your academic ancestors back to<\/b><b>,<\/b><b>\u00a0on one side of the family<\/b><b>,<\/b><b>\u00a0the 17<\/b><b>th<\/b><b>\u00a0century! So, tell us your story, Stefan. Upon whose shoulders do you stand, both personally and academically, and how did you get where you are today from where you started back in your early years?<\/b><\/p>\n<p>Stefan Saroiu: You know, when I look at it, it feels very humbling. Every once in a while, I go back and take a pause to reflect because you look at those names and you go, oh, gosh, those are some big shoes to fill!\u00a0I had the opportunity to work with two different advisors in my graduate school and therefore I have two genealogies. And like you said, one goes back to the 17th\u00a0century\u00a0and included\u00a0names like, Karl Jacobi and John McCarthy. And Jacobi was mostly known for math and things like elliptic functions and number theory,\u00a0and John McCarthy is known for being one of the founders of AI. John\u2019s student was Barbara Liskov, who just won the Turing Award a couple of years ago and she\u2019s sort of a role model for me. So yeah, I feel very, very humbled and I look at that, periodically to sort of remind myself as to where the bar is!<\/p>\n<p><b>Host: Right<\/b><b>?<\/b><b>\u00a0So, tell, tell us a little bit about you<\/b><b>,<\/b><b>\u00a0then. You\u2019ve come into this in the 20<\/b><b>th<\/b><b>\u00a0century and have started to make your own mark.\u00a0<\/b><b>H<\/b><b>ow did you get from A to B?<\/b><\/p>\n<p>Stefan Saroiu: I was born and grew up behind the iron curtain in\u00a0Bucharest,\u00a0Romania,\u00a0and I was very lucky to attend a high school that was very strong academically, especially in mathematics and computer science. So, in the late 80s and early 90s, I was sort of studying things like algorithms and graph theory and programming languages and so forth and we also did a lot of math. And in some sense, I was very lucky to have this training in math and computer science,\u00a0but it came at a cost that I am terrible at anything else! And when I finished high school, my family decided to immigrate to Canada and\u00a0they went\u00a0to Calgary, Alberta,\u00a0and when I got there, Canada had a program where immigrants who lacked English skills, they would be enrolled in free English as a\u00a0Second\u00a0Language kind of form of schooling and I spent three months going to English school with my mom and dad. And my mom and I were in the same\u00a0class, actually. We were in Level 3 and my dad was in Level 1. And I remember\u2026 I remember very clearly,\u00a0sort of,\u00a0meeting my dad in the hallways during lunch and having lunch together. It\u2019s \u2013 yeah, this was\u2026<\/p>\n<p><b>Host: I\u2019m dying!<\/b><\/p>\n<p>Stefan Saroiu: \u2026I was\u2026 I was about nineteen, yeah, I was nineteen at the time.\u00a0A\u00a0couple of years later, I went to college at the University of Waterloo, which is a great school in computer science in Canada, and Waterloo has this wonderful co-op program where,\u00a0as part of graduating college,\u00a0you have to actually go do internships in industry. And I was lucky to do three internships with Microsoft back in the 90s.\u00a0And I came to Seattle, and I saw Seattle, and when time came to go to graduate school, one of the places I applied to was University of Washington in Seattle. So, I came to U Dub, and once I graduated, I wanted to join academia. So, I went and took a job as a professor at the University of Toronto. And at Toronto I worked with some fabulous students. And then after a couple of years at Toronto, I kind of started missing the intensity of the west coast and the tech scene here. One of the things I didn\u2019t realize before leaving Seattle is that,\u00a0west coast is really one of the best place on\u00a0earth to be a computer scientist because you meet a lot of people who understand what you\u2019re doing\u00a0and\u00a0speak your language. And I talked to some of my friends and they offered me to come interview at MSR. I knew\u00a0Seattle.\u00a0And I came, and I never left, and I had a wonderful\u00a0time!<\/p>\n<p><b>Host: What is one interesting thing we might not know about you, maybe it\u2019s a personality trait, a defining life moment, hobby, side quest<\/b><b>\u2026<\/b><b>\u00a0that has impacted your life or career?<\/b><\/p>\n<p>Stefan Saroiu: A lot of computer science researchers in the US who are not born here, they came here to do their PhDs.\u00a0But I came much, much earlier,\u00a0and I did not come with a plan to actually continue my education or pursue any advanced education. So, I have a lot of immigrant stories and I think a lot of those sort of have marked the way I think. People had a hard time working with me because I would insist that we work as hard as possible,\u00a0and we never have any moment of relaxation\u00a0or\u00a0anything like that and I really, truly believe that that\u2019s actually\u00a0very detrimental to a researcher. A researcher has to be a little bit more balanced and I remember very clearly, Steve Gribble, one of my advisors, telling me over and over again, Stefan, it\u2019s not just about working harder. It\u2019s also about working smarter. And it took me a long time to understand what he meant. You\u00a0have to\u00a0let time allow you to have the flow of creativity\u00a0and\u00a0see things in ways that maybe others haven\u2019t seen them before.<\/p>\n<p><b>Host: As we close, I\u2019d like you to take a shot at painting a picture of a future world in which you\u2019ve been wildly successful. At the end of your career, what do you hope to have accomplished as a scientist and how will your research have made a difference in our lives?<\/b><\/p>\n<p>Stefan Saroiu: Thank you for asking this question. I actually thought about this and I\u2019m thinking quite a bit about it. If you had asked me this question ten years ago, my answer would have been, I want to make sure that my research work is being used by millions of people. And I was very fortunate to be able to accomplish that at MSR, not just once, but maybe a couple of times. So, going forward, again, I see my role as keeping an eye on making sure that we avoid a form of a wipe out event, at the very least, that exploits some form of DRAM. And if, you know, a decade or two from now, we manage to say, hey, yeah,\u00a0you know,\u00a0we\u2019ve had compromises here and there, but for the most part, the internet worked really well, cloud computing worked really well, you know, AI worked really well\u2026\u00a0then I hope that at least a little part of that was due to my work as well.<\/p>\n<p><b>Host: Stefan Saroiu, I for one am glad you\u2019re doing the job you\u2019re doing. Thank you for that and thank you for joining us today on the podcast.<\/b><\/p>\n<p>Stefan Saroiu: Thank you and thank you for your insightful questions, Gretchen.<\/p>\n<p><b><i>(music plays)<\/i><\/b><\/p>\n<p><b><i>To learn more about Dr. Stefan Saroiu, and the ongoing fight against Rowhammer attacks, visit Microsoft.com\/research<\/i><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dynamic random-access memory \u2013 or DRAM \u2013 is the most popular form of volatile computer memory in the world but it\u2019s particularly susceptible to Rowhammer, an adversarial attack that can cause data loss and security exploits in everything from smart phones to the cloud. On the podcast, Dr. Stefan Saroiu, a Senior Principal Researcher in MSR\u2019s Mobility and Networking group, explains why DRAM remains vulnerable to Rowhammer attacks today, even after several years of mitigation efforts, and then tells us how a new approach involving bespoke extensibility mechanisms for DRAM might finally hammer Rowhammer in the fight to keep data safe and secure.<\/p>\n","protected":false},"author":37583,"featured_media":670308,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"https:\/\/player.blubrry.com\/id\/64008499\/","msr-podcast-episode":"119","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[240054],"tags":[],"research-area":[13552,13558,13547],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-670293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msr-podcast","msr-research-area-hardware-devices","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"https:\/\/player.blubrry.com\/id\/64008499\/","podcast_episode":"119","msr_research_lab":[199565],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[144899,1148488],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-960x540.png\" class=\"img-object-cover\" alt=\"head shot of Dr. Stefan Saroiu for the Microsoft Research Podcast\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-960x540.png 960w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-300x169.png 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1024x577.png 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-768x432.png 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1536x865.png 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-2048x1153.png 2048w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1066x600.png 1066w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-655x368.png 655w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-343x193.png 343w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-640x360.png 640w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1280x720.png 1280w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/07\/Stefan_podcast_1400x788_No-logos-1920x1080.png 1920w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","byline":"","formattedDate":"July 8, 2020","formattedExcerpt":"Dynamic random-access memory \u2013 or DRAM \u2013 is the most popular form of volatile computer memory in the world but it\u2019s particularly susceptible to Rowhammer, an adversarial attack that can cause data loss and security exploits in everything from smart phones to the cloud. On&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/670293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/users\/37583"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/comments?post=670293"}],"version-history":[{"count":12,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/670293\/revisions"}],"predecessor-version":[{"id":743683,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/posts\/670293\/revisions\/743683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/670308"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=670293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/categories?post=670293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/tags?post=670293"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=670293"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=670293"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=670293"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=670293"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=670293"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=670293"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=670293"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=670293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}