“…To combat attacks that exploit the RowHammer phenomenon, various RowHammer mitigation mechanisms have been proposed in literature [4,5,9,22,27,55,56,59,68,91,115,117,121,124,130,131,137]. 2 Yaglikci et al [130] classify these mitigation mechanisms into four groups: 𝑖) increasing the refresh rate to reduce the number of activations that can be performed within a refresh interval [4,56], 𝑖𝑖) isolating sensitive data from DRAM rows that an attacker can potentially hammer [9,59,124], 𝑖𝑖𝑖) keeping track of row activations and refreshing potential victim rows [5,22,55,56,68,91,115,117,121,131,137], and 𝑖𝑣) throttling row activations to limit the times a row can be activated within a refresh interval [27,56,130]. Many of these research proposals describe the details of their proposed mechanisms and discuss their security guarantees [56,91,130].…”