My name is Martin. I'm currently working as associate researcher at the Institute for Information Systems at Hof University and doing my PhD at TU Graz. I'm working partly self-employed as freelancer at AMH Security.
2026: FlippyR.AM: A Large-Scale Study of Rowhammer Prevalence
Martin Heckel, Nima Sayadi, Jonas Juffinger, Carina Fiedler, Daniel Gruss, Florian Adamsky
NDSS'26, San Diego, CA, USA, February 23 - 27, 2026.
2026: Memory Band-Aid: A Principled Rowhammer Defense-in-Depth
Carina Fiedler, Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Hannes Weissteiner, Abdullah Giray Yağlıkçı, Florian Adamsky, Daniel Gruss
NDSS'26, San Diego, CA, USA, February 23 - 27, 2026.
2025: Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity
Martin Heckel, Hannes Weissteiner, Florian Adamsky, Daniel Gruss
ESORICS'25, Toulouse, France, September 22 - 26, 2025.
2025: Verifying DRAM Addressing in Software
Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher, Daniel Gruss
ESORICS'25, Toulouse, France, September 22 - 26, 2025.
Conference Preprint Slides Cite Code (DramaNg) Code (DramaVerify)
2025: Flipper: Rowhammer on Steroids
Martin Heckel, Florian Adamsky
uASC'25, Bochum, Germany, February 19, 2025.
2024: Presshammer: Rowhammer and Rowpress without Physical Address Information
Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss
DIMVA'24, Lausanne, Switzerland, July 17 - 19, 2024.
2023: Reverse-Engineering Bank Addressing Functions on AMD CPUs
Martin Heckel, Florian Adamsky
DRAMSec'23, Virtual, June 17-18, 2023.
2024: Ten Years of Rowhammer: A Retrospect (and Path to the Future)
38C3, Hamburg, Germany, December 27 - 30, 2024.
2022: Master's degree (M.Sc.) in computer science
2021: Bachelor's degree (B.Sc.) in computer science
2019: Vocational education as Computer Science Expert (Subject Area: System Integration)
This section contains the final theses I have submitted. I've uploaded the documents in an AS-IS state. Some details are simplified, some missing, etc.
2022: We don't need no Exploitation - Systematic Investigation of Process-based Rowhammer Exploitation (for M.Sc.)
2021: RAEAX - Rowhammer Amplification by Execution of Additional X86 instructions (for B.Sc.)
2021: Hammerkit - Toolset for Memory inspection and automatic Rowhammer detection (for B.Sc.)
2019: Rechteverwaltung in Git innerhalb eines Repository (for Computer Science Expert, german)
In this section, there are some documents I wrote (mostly at hof university). Some documents were written in collaboration with other students. I've uploaded the documents in an AS-IS state. Some details are simplified, some missing, etc.
2022: Kernel Samepage Merging (KSM) - Funktionsweise und Schwachstellen (german)
2022: XAI on Reinforcement Learning
2021: Novel Rowhammer Attacks
2021: ESP8266
2020: Zeitreihenanalyse mit SARIMA (german)
2020: Penetration Testing: Metasploit (german)
2019: Sortierverfahren Bucketsort, Heapsort, Radixsort (german)
2019: Studienarbeit über die Schwachstelle CVE-2019-11005 (german)
2019: Bestärkendes Lernen (german)
2017: Künstliche neuronale Netze - How to build an AI (german)
Just write a mail to:
2025 (at) xitokero (dot) de
I'm using GnuPG for encrypting and signing mails. I'd prefer it if you would encrypt the mails you send me using my GnuPG public key. The fingerprint of the key is:
7D4E F51C BF86 FD36 1183 D38A 6C89 7A2F D501 5B70
If you get a mail from me, you should check if it comes from the mail server at xitokero. Otherwise it is probably not from me.
I'll sign all mails I send using the key above. If the signature is invalid or the mail is not signed it is probably not from me.
If you're not sure if a mail is from me or not, just write a mail to the address listed on this site and ask.
You can follow me at mastodon (@lunkw1ll).