MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture 2021
DOI: 10.1145/3466752.3480069
|View full text |Cite
|
Sign up to set email alerts
|

A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses

Abstract: RowHammer is a circuit-level DRAM vulnerability where repeatedly accessing (i.e., hammering) a DRAM row can cause bit flips in physically nearby rows. The RowHammer vulnerability worsens as DRAM cell size and cell-to-cell spacing shrink. Recent studies demonstrate that modern DRAM chips, including chips previously marketed as RowHammer-safe, are even more vulnerable to RowHammer than older chips such that the required hammer count to cause a bit flip has reduced by more than 10X in the last decade. Therefore, … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
42
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 31 publications
(42 citation statements)
references
References 138 publications
0
42
0
Order By: Relevance
“…Therefore, we implement RS and TRR-A using SoftMC [33,105], an FPGA-based DRAM testing infrastructure that provides precise control on the DDR commands issued to a DRAM module. We modify SoftMC to support testing DDR4 modules, as also done in [24,54,88,89]. Fig.…”
Section: Required Experimental Setup For U-trrmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, we implement RS and TRR-A using SoftMC [33,105], an FPGA-based DRAM testing infrastructure that provides precise control on the DDR commands issued to a DRAM module. We modify SoftMC to support testing DDR4 modules, as also done in [24,54,88,89]. Fig.…”
Section: Required Experimental Setup For U-trrmentioning
confidence: 99%
“…Kim et al [56] are the first to introduce and analyze the RowHammer phenomenon. Numerous later works develop RowHammer attacks to compromise various systems in various ways [1, 7, 8, 15, 16, 19, 23, 24, 28, 29, 34, 38, 44, 54, 62, 71, 82, 83, 96, 98, 100, 104, 109, 122-124, 128, 129, 136, 140] and analyze RowHammer further [15,16,28,54,89,97,98,122,126,135]. To our knowledge, this is the first work to 1) propose an experimental methodology to understand the inner workings of commonly-implemented in-DRAM RowHammer protection (i.e., TRR) mechanisms and 2) use this understanding to create custom access patterns that circumvent the TRR mechanisms of modern DDR4 DRAM chips.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…SoftMC can issue arbitrary sequences of DDR3 commands to real DRAM devices. SoftMC is widely used in prior work that study the performance, reliability and security of real DRAM chips [18,27,33,35,43,51,61,67,70,77,90,108]. SoftMC is built to test DRAM devices, not to study end-to-end implementations of PuM techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, as memory designers shrink (i.e., scale) memory process technology node sizes to meet ambitious capacity, cost, performance, and energy efficiency targets, worsening reliability becomes an increasingly significant challenge to surmount [10,21,54,74,87,89,91,107,116,129,132,136,144,150,170]. For example, DRAM process technology scaling exacerbates cell-to-cell variation and noise margins, severely impacting error mechanisms that constrain yield, including cell data-retention [21,46,47,54,74,76,77,93,110,136,144,147,161,171] and read-disturb [40,52,87,91,131,132,141] phenomena. Similarly, emerging main memory technologies suffer from various error mechanisms that can lead to high error rates if left unchecked, such as limited endurance, resistance drift, and write disturbance in PCM [10,62,73,88,101,105] and data retention, endurance, and read disturbance in STT-RAM [9,…”
Section: Introductionmentioning
confidence: 99%