2019
DOI: 10.1007/978-3-030-16350-1_1
|View full text |Cite
|
Sign up to set email alerts
|

RowHammer and Beyond

Abstract: We will discuss the RowHammer problem in DRAM, which is a prime (and likely the first) example of how a circuit-level failure mechanism in Dynamic Random Access Memory (DRAM) can cause a practical and widespread system security vulnerability. RowHammer is the phenomenon that repeatedly accessing a row in a modern DRAM chip predictably causes errors in physically-adjacent rows. It is caused by a hardware failure mechanism called read disturb errors. Building on our initial fundamental work that appeared at ISCA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 82 publications
0
3
0
Order By: Relevance
“…You, the Hardware Designer" [41], at DATE 2017 [176], and at the Top Picks in Hardware and Embedded Security workshop, co-located with ICCAD 2018 [11], where RowHammer was selected as a Top Pick among hardware and embedded security papers published between 2012-2017. The most recent version of the associated talk was delivered at COSADE 2019 [179]. commercial microprocessors and memory/storage systems.…”
Section: Acknowledgmentsmentioning
confidence: 99%
“…You, the Hardware Designer" [41], at DATE 2017 [176], and at the Top Picks in Hardware and Embedded Security workshop, co-located with ICCAD 2018 [11], where RowHammer was selected as a Top Pick among hardware and embedded security papers published between 2012-2017. The most recent version of the associated talk was delivered at COSADE 2019 [179]. commercial microprocessors and memory/storage systems.…”
Section: Acknowledgmentsmentioning
confidence: 99%
“…This means that RowHammer is a potential threat across all DRAM generations and designs. Kim et al [62] show that RowHammer appears to be an e ect of continued DRAM technology scaling [62,88,90,91], which means that as manufacturers increase DRAM storage density, their chips are potentially more susceptible to RowHammer. This increase in RowHammer vulnerability is often quanti ed for a given DRAM chip by measuring the number of times a single row must be activated (i.e., single-sided RowHammer) to induce the rst bit ip.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, there has been no work since the original RowHammer paper [62] that provides a rigorous characterization-based study to demonstrate how chips' vulnerabilities to RowHammer (i.e., the minimum number of activations required to induce the rst RowHammer bit ip) scale across di erent DRAM technology generations. While many works [5,63,89,90,91] speculate that modern chips are more vulnerable, there is no rigorous experimental study that demonstrates exactly how the minimum activation count to induce the rst RowHammer bit ip and other RowHammer characteristics behave in modern DRAM chips. Such an experimental study would enable us to predict future chips' vulnerability to RowHammer and estimate whether existing RowHammer mitigation mechanisms can e ectively prevent RowHammer bit ips in modern and future chips.…”
Section: Introductionmentioning
confidence: 99%