Security Analysis of the Silver Bullet Technique for RowHammer Prevention
@article{Yagliki2021SecurityAO, title={Security Analysis of the Silver Bullet Technique for RowHammer Prevention}, author={Abdullah Giray Yaglikçi and Jeremie S. Kim and Fabrice Devaux and Onur Mutlu}, journal={ArXiv}, year={2021}, volume={abs/2106.07084} }
The purpose of this document is to study the security properties of the Silver Bullet algorithm against worst-case RowHammer attacks. We mathematically demonstrate that Silver Bullet, when properly configured and implemented in a DRAM chip, can securely prevent RowHammer attacks. The demonstration focuses on the most representative implementation of Silver Bullet, the patent claiming many implementation possibilities not covered in this demonstration. Our study concludes that Silver Bullet is a…
Figures and Tables from this paper
9 Citations
Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications
- Computer ScienceMICRO
- 2021
U-TRR is presented, an experimental methodology to analyze in-DRAM TRR implementations and shows how it allows us to craft RowHammer access patterns that successfully circumvent the TRR mechanisms employed in 45 DRAM modules of the three major DRAM vendors.
A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM
- Computer ScienceArXiv
- 2022
This work characterize rowhammer attacks comprehensively, shedding lights on possible new attack vectors that have not yet been explored, and summarizes and classify existing software defenses, from which new defense strategies are identified and worth future exploring.
A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses
- Computer ScienceMICRO
- 2021
An experimental characterization using 248 DDR4 and 24 DDR3 modern DRAM chips from four major DRAM manufacturers demonstrating how the RowHammer effects vary with three fundamental properties: 1) DRAM chip temperature, 2) aggressor row active time, and 3) victim DRAM cell’s physical location is presented.
SpyHammer: Using RowHammer to Remotely Spy on Temperature
- Computer ScienceArXiv
- 2022
This work proposes a new RowHammer attack, called SpyHammer, that spies on the temperature of critical systems such as industrial production lines, vehicles, and medical systems.
Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
- Computer Science2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
- 2022
This is the first work to experimentally demonstrate on 272 real DRAM chips that lowering VPP reduces a DRAM chip’s RowHammer vulnerability and concludes that reducing VPP is a promising strategy for reducing aDRAM chip's RowHammers vulnerability without requiring modifications toDRAM chips.
A Case for Transparent Reliability in DRAM Systems
- Computer ScienceArXiv
- 2022
A two-step approach is introduced that reevaluates DRAM standards with a focus on transparency of reliability characteristics so that system designers are encouraged to make the most of commodity DRAM technology for both current and future DRAM chips.
HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips
- Computer Science2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO)
- 2022
Hidden Row Activation (HiRA) is proposed, a new operation that can reliably parallelize a DRAM row’s refresh operation with refresh or activation of any of the 32% of the rows within the same bank and reduces the overall latency of two refresh operations.
A Case for Self-Managing DRAM Chips: Improving Performance, Efficiency, Reliability, and Security via Autonomous in-DRAM Maintenance Operations
- Computer ScienceArXiv
- 2022
Self-Managing DRAM is proposed, a new low-cost DRAM architecture that enables implementing new in-DRAM maintenance mechanisms with no further changes in the DRAM interface, memory controller, or other system components and enables easy adoption of efficient maintenance mechanisms that significantly improve the system performance and energy efficiency while providing higher reliability.
Fundamentally Understanding and Solving RowHammer
- Computer Science2023 28th Asia and South Pacific Design Automation Conference (ASP-DAC)
- 2023
Two major directions are argued for to amplify research and development efforts in building a much deeper understanding of the RowHammer problem and its many dimensions, in both cutting-edge DRAM chips and computing systems deployed in the field, and the design and development of extremely efficient and fully-secure solutions via system-memory cooperation.
References
SHOWING 1-10 OF 21 REFERENCES
RowHammer: A Retrospective
- Computer ScienceIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- 2020
A principled approach to memory reliability and security research is described and advocated that can enable us to better anticipate and prevent vulnerabilities in DRAM and other types of memories, as the memory technologies scale to higher densities.
The RowHammer problem and other issues we may face as memory becomes denser
- Computer ScienceDesign, Automation & Test in Europe Conference & Exhibition (DATE), 2017
- 2017
This work discusses the RowHammer problem in DRAM, which is a prime (and perhaps the first) example of how a circuit-level failure mechanism can cause a practical and widespread system security vulnerability, and describes and advocates a principled approach to memory reliability and security research that can enable us to better anticipate and prevent such vulnerabilities.
TWiCe: Preventing Row-hammering by Exploiting Time Window Counters
- Computer Science2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA)
- 2019
This paper proposes a new counter-based RH prevention solution named Time Window Counter (TWiCe) based row refresh, which accurately detects potential RH attacks only using a small number of counters with a minimal performance impact.
TRRespass: Exploiting the Many Sides of Target Row Refresh
- Computer Science2020 IEEE Symposium on Security and Privacy (SP)
- 2020
The inner workings of TRR are demystified, which shows that what is advertised as a single mitigation mechanism is actually a series of different solutions coalesced under the umbrella term Target Row Refresh, and it is demonstrated that modern implementations operate entirely inside DRAM chips.
BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows
- Computer Science2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)
- 2021
The key idea of BlockHammer is to track row activation rates using area-efficient Bloom filters, and use the tracking data to ensure that no row is ever activated rapidly enough to induce RowHammer bit-flips.
Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques
- Computer Science2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)
- 2020
Five state-of-the-art RowHammer mitigation mechanisms are evaluated using cycle-accurate simulation in the context of real data taken from chips to study how the mitigation mechanisms scale with chip vulnerability, and it is found that existing mechanisms either are not scalable or suffer from prohibitively large performance overheads in projected future devices.
Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors
- Computer Science2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA)
- 2014
This paper exposes the vulnerability of commodity DRAM chips to disturbance errors, and shows that it is possible to corrupt data in nearby addresses by reading from the same address in DRAM by activating the same row inDRAM.
Experiments and root cause analysis for active-precharge hammering fault in DDR3 SDRAM under 3 × nm technology
- EngineeringMicroelectron. Reliab.
- 2016
Trap-Assisted DRAM Row Hammer Effect
- PhysicsIEEE Electron Device Letters
- 2019
Through 3D TCAD simulations with single charge traps, we discovered a direct evidence to the mechanism of DRAM row hammer effect. It is governed by a charge pumping process, consisting of charge…
Tiered-latency DRAM: A low latency and low cost DRAM architecture
- Computer Science2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA)
- 2013
This work introduces Tiered-Latency DRAM (TL-DRAM), which achieves both low latency and low cost-per-bit, and proposes mechanisms that use the low-latency segment as a hardware-managed or software-managed cache.