2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) 2020
DOI: 10.1109/micro50266.2020.00014
|View full text |Cite
|
Sign up to set email alerts
|

Graphene: Strong yet Lightweight Row Hammer Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
122
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(123 citation statements)
references
References 37 publications
1
122
0
Order By: Relevance
“…The authors show that proposed hardware mitigations [32,37,60] struggle to scale or cannot provide comprehensive protection given increasing DRAM density. Consistent with these findings, state-of-theart follow-up defenses [44,59] are limited by worsening performance overhead and a need for increasing SRAM or CAM area (i.e., relatively-expensive memory) as density increases.…”
Section: Introductionmentioning
confidence: 82%
See 1 more Smart Citation
“…The authors show that proposed hardware mitigations [32,37,60] struggle to scale or cannot provide comprehensive protection given increasing DRAM density. Consistent with these findings, state-of-theart follow-up defenses [44,59] are limited by worsening performance overhead and a need for increasing SRAM or CAM area (i.e., relatively-expensive memory) as density increases.…”
Section: Introductionmentioning
confidence: 82%
“…Finally, in an ideal world with support from DRAM, the DDR standard would include a REF_NEIGHBORS command, similar to that proposed in prior work [37,44]. However, in addition to taking an aggressor row address as an argument, we propose that the command should also accept a blast radius for adaptability to emerging threats.…”
Section: Refresh-centric: a Refreshing Takementioning
confidence: 99%
“…SIMDRAM and other similar in-DRAM computation mechanisms that use dedicated DRAM rows to perform computation may increase vulnerability to RowHammer attacks [36,68,72,103,106]. We believe, and the literature suggests, that there should be robust and scalable solutions to RowHammer, orthogonally to our work (e.g., BlockHammer [150], PARA [71], TWiCe [86], Graphene [116]). Exploring RowHammer prevention and mitigation mechanisms in conjunction with SIMDRAM (or other PIM approaches) requires special attention and research, which we leave for future work.…”
Section: Security Implicationsmentioning
confidence: 77%
“…A limitation of these mechanisms is that they are configured for the smallest (worst-case) HC first across all rows in a DRAM bank even though an overwhelming majority of rows exhibit significantly larger HC first values. This is an important limitation because, when configured for a smaller HC first value, the performance, energy, and area overheads of many RowHammer defense mechanisms significantly increase [71,112,163]. To overcome this limitation, a system designer can configure a RowHammer defense mechanism to use different HC first values for different DRAM rows.…”
Section: Potential Defense Improvementsmentioning
confidence: 99%
“…To overcome this limitation, a system designer can configure a RowHammer defense mechanism to use different HC first values for different DRAM rows. For example, BlockHammer's [163] and Graphene's [112] area costs can reach approximately 0.6% and 0.5% of a high-end processor's die area [163]. However, based on our Obsv.…”
Section: Potential Defense Improvementsmentioning
confidence: 99%