Rowhammer is the name of a security exploit in DDR3 and DDR4 RAM modules first studied in 2014. The attacks using this technique produced by the research community since then are still unmitigated today, so this a very real vulnerability. Rowhammer is quite an interesting case study, as it is potentially the best example of a hardware vulnerability that it easy to exploit in high-level code.
I wrote a survey paper describing the Rowhammer technique and briefly outlining the five years of research since the first paper on the subject. My survey follows the chronological order of the first few publications, and then I pick some interesting and influential papers to cover the more recent advances.