2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00090
|View full text |Cite
|
Sign up to set email alerts
|

TRRespass: Exploiting the Many Sides of Target Row Refresh

Abstract: After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what was meant to be the definitive hardware solution against the RowHammer problem: Target Row Refresh (TRR). A common belief among practitioners is that, for the latest generation of DDR4 systems that are protected by TRR, RowHammer is no longer an issue in practice. However, in reality, very little is known about TRR. How does TRR exactly prevent RowHammer? Which parts of a system are responsible for operating the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

3
228
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 119 publications
(232 citation statements)
references
References 49 publications
3
228
1
Order By: Relevance
“…While DRAM occasionally remaps two logically-adjacent rows to different internal locations [11], these remaps (and thus, internal adjacency) can be revealed via established methods. In particular, prior work [11,15,30,34] uses the success or failure of Rowhammer attacks themselves-which require physicallyproximate rows-to infer row adjacency.…”
Section: Dram+rowhammer: a Crash Coursementioning
confidence: 99%
See 2 more Smart Citations
“…While DRAM occasionally remaps two logically-adjacent rows to different internal locations [11], these remaps (and thus, internal adjacency) can be revealed via established methods. In particular, prior work [11,15,30,34] uses the success or failure of Rowhammer attacks themselves-which require physicallyproximate rows-to infer row adjacency.…”
Section: Dram+rowhammer: a Crash Coursementioning
confidence: 99%
“…Refresh-Centric. Finally, refresh-centric mitigations (e.g., [4,15,32,37,48,60,62]) seek to refresh potential victim rows before they experience bit flips. More specifically, these defenses use a set of hardware and-in some cases-software mechanisms to identify potential victim rows.…”
Section: Rowhammer Mitigations: a Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…The confluence of DRAM ubiquity, increasing RH susceptibility, and the possibility to use this unique disturb to gain unauthorized access has created a major hardware security concern across all modern computing systems [7] from cloud servers [8] through personal computers [4], [9] to mobile phones [10].…”
mentioning
confidence: 99%
“…Such approaches are regarded as competitive advantages by the DRAM manufacturers and so remain opaque to the users. The problem is that every mitigation up until now has been hacked [7], [11], [12] leaving all compute systems in jeopardy.…”
mentioning
confidence: 99%