When I saw this title, I believed that perhaps they have found a method to detect a Rowhammer attack, which could be used to initiate countermeasures.
Unfortunately no, they have found how to use a Rowhammer attack to obtain a fingerprint of the computer on which it is executed, which can be used to uniquely identify any computer, even among many computers with identical hardware and identical installed software.
Unfortunately no, they have found how to use a Rowhammer attack to obtain a fingerprint of the computer on which it is executed, which can be used to uniquely identify any computer, even among many computers with identical hardware and identical installed software.