2021
DOI: 10.1109/ted.2021.3060362
|View full text |Cite
|
Sign up to set email alerts
|

On DRAM Rowhammer and the Physics of Insecurity

Abstract: The dynamic random access memory (DRAM) disturb known as rowhammer (RH) has come to dominate the insecurity of computing systems worldwide. Several studies have concentrated on electron injection from a switching cell select transistor and capture by nearby storage node junctions as being the main mechanism for the effect. This article for the first time looks in-depth at RH from the point of view of both electron injection and capture, and capacitive crosstalk. The absence of such comprehensive studies at the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 51 publications
1
28
0
Order By: Relevance
“…Modern DRAM chips suffer from an error mechanism, called RowHammer [71,72,101] that happens when a DRAM row (i.e., aggressor row) is repeatedly activated enough times before its neighboring rows (i.e., victim rows) get refreshed [29,58,71,72,99,101,110,111,127,153,[164][165][166]. Due to the aggressive reduction in manufacturing process technology node size, DRAM cells become smaller and closer to each other, exacerbating the RowHammer vulnerability.…”
Section: The Rowhammer Vulnerabilitymentioning
confidence: 99%
See 3 more Smart Citations
“…Modern DRAM chips suffer from an error mechanism, called RowHammer [71,72,101] that happens when a DRAM row (i.e., aggressor row) is repeatedly activated enough times before its neighboring rows (i.e., victim rows) get refreshed [29,58,71,72,99,101,110,111,127,153,[164][165][166]. Due to the aggressive reduction in manufacturing process technology node size, DRAM cells become smaller and closer to each other, exacerbating the RowHammer vulnerability.…”
Section: The Rowhammer Vulnerabilitymentioning
confidence: 99%
“…Thus, it is necessary to rigorously understand the RowHammer vulnerability of modern DRAM chips, project future attacks, and develop effective RowHammer defense mechanisms in modern systems that use DRAM. Through characterization [71,72,110,111] and modeling [29,58,111,123,127,153,[164][165][166], past research shows that circuit-level capacitive coupling [58,123] and trap-assisted leakage [166] have a significant effect on RowHammer bit flips [153].…”
Section: The Rowhammer Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…However, as semiconductor technology gradually advances and new memory structures are continuously developed, it is unrealistic to model every aspect of memory failure mechanisms. For example, it is not possible to describe all aspects of the radiation-induced or rowhammer failure mechanisms because the mechanisms can vary with power, voltage, and temperature (PVT) conditions, as well as other memory constraints [6], [7], [8]. An FM is an abstraction of a failure mechanism [9], [10]; when the failure mechanisms are not properly blended into the FMs, test algorithms generated based on these FMs cannot properly test the memory failure mechanisms.…”
Section: Introductionmentioning
confidence: 99%