2017 IEEE International Solid-State Circuits Conference (ISSCC) 2017
DOI: 10.1109/isscc.2017.7870426
|View full text |Cite
|
Sign up to set email alerts
|

23.3 A 4.8Gb/s/pin 2Gb LPDDR4 SDRAM with sub-100µA self-refresh current for IoT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 1 publication
1
18
0
Order By: Relevance
“…However, once the uncommon case, ECC-equipped platforms are now on the rise, from large cloud providers (e.g., Amazon EC2 [14]) to high-end consumer platforms [15]. In addition, ECC memory is increasingly deployed on low-power platforms such as mobile and IoT devices to drop the DRAM refresh rate below "safe" values and save power [16], [17]. It has therefore become important to quantitatively assess the effectiveness of ECC memory as a Rowhammer mitigation.…”
Section: Introductionmentioning
confidence: 99%
“…However, once the uncommon case, ECC-equipped platforms are now on the rise, from large cloud providers (e.g., Amazon EC2 [14]) to high-end consumer platforms [15]. In addition, ECC memory is increasingly deployed on low-power platforms such as mobile and IoT devices to drop the DRAM refresh rate below "safe" values and save power [16], [17]. It has therefore become important to quantitatively assess the effectiveness of ECC memory as a Rowhammer mitigation.…”
Section: Introductionmentioning
confidence: 99%
“…10 shows the distribution of RowHammer bit flips that our custom access patterns induce across 8-byte data chunks as boxand-whisker plots 14 for all 45 DRAM modules we test across three vendors. We use 8-byte data chunks as DRAM ECC typically uses 8-byte or larger datawords [10,37,43,60,61,79,87,118].…”
Section: Bypassing System-level Ecc Using U-trrmentioning
confidence: 99%
“…The large number of RowHammer bit flips caused by our specialized access patterns has significant implications for systems protected by Error Correction Codes (ECC) [47,92,93,95]. Our analysis shows that the U-TRR-discovered access patterns can cause up to 7 bit flips at arbitrary locations in one 8-byte dataword, suggesting that typical ECC schemes capable of correcting one error/symbol and detecting two errors/symbols (e.g., SECDED ECC [10,37,43,60,61,79,87,118] and Chipkill [2,20,86]) cannot provide sufficient protection against RowHammer even in the presence of TRR mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…Prior works [60,97,98,120,129,133,138,147] indicate that existing on-die ECC codes are 64-or 128-bit single-error correction (SEC) Hamming codes [44]. However, each DRAM manufacturer considers their on-die ECC mechanism's design and implementation to be highly proprietary and ensures not to reveal its details in any public documentation, including DRAM standards [68,69], DRAM datasheets [63,121,149,158], publications [76,97,98,133], and industry whitepapers [120,147].…”
Section: Introductionmentioning
confidence: 99%
“…For each of these third parties, merely knowing or reverseengineering the type of ECC code (e.g., n-bit Hamming code) based on existing industry [60,97,98,120,133,147] and academic [129,138] publications is not enough to determine exactly how the ECC mechanism obfuscates speci c error pa erns.…”
Section: Introductionmentioning
confidence: 99%