2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA) 2021
DOI: 10.1109/hpca51647.2021.00037
|View full text |Cite
|
Sign up to set email alerts
|

BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
61
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 54 publications
(63 citation statements)
references
References 79 publications
2
61
0
Order By: Relevance
“…To combat attacks that exploit the RowHammer phenomenon, various RowHammer mitigation mechanisms have been proposed in literature [4,5,9,22,27,55,56,59,68,91,115,117,121,124,130,131,137]. 2 Yaglikci et al [130] classify these mitigation mechanisms into four groups: 𝑖) increasing the refresh rate to reduce the number of activations that can be performed within a refresh interval [4,56], 𝑖𝑖) isolating sensitive data from DRAM rows that an attacker can potentially hammer [9,59,124], 𝑖𝑖𝑖) keeping track of row activations and refreshing potential victim rows [5,22,55,56,68,91,115,117,121,131,137], and 𝑖𝑣) throttling row activations to limit the times a row can be activated within a refresh interval [27,56,130]. Many of these research proposals describe the details of their proposed mechanisms and discuss their security guarantees [56,91,130].…”
Section: Rowhammer Mitigation Mechanismsmentioning
confidence: 99%
See 4 more Smart Citations
“…To combat attacks that exploit the RowHammer phenomenon, various RowHammer mitigation mechanisms have been proposed in literature [4,5,9,22,27,55,56,59,68,91,115,117,121,124,130,131,137]. 2 Yaglikci et al [130] classify these mitigation mechanisms into four groups: 𝑖) increasing the refresh rate to reduce the number of activations that can be performed within a refresh interval [4,56], 𝑖𝑖) isolating sensitive data from DRAM rows that an attacker can potentially hammer [9,59,124], 𝑖𝑖𝑖) keeping track of row activations and refreshing potential victim rows [5,22,55,56,68,91,115,117,121,131,137], and 𝑖𝑣) throttling row activations to limit the times a row can be activated within a refresh interval [27,56,130]. Many of these research proposals describe the details of their proposed mechanisms and discuss their security guarantees [56,91,130].…”
Section: Rowhammer Mitigation Mechanismsmentioning
confidence: 99%
“…2 Yaglikci et al [130] classify these mitigation mechanisms into four groups: 𝑖) increasing the refresh rate to reduce the number of activations that can be performed within a refresh interval [4,56], 𝑖𝑖) isolating sensitive data from DRAM rows that an attacker can potentially hammer [9,59,124], 𝑖𝑖𝑖) keeping track of row activations and refreshing potential victim rows [5,22,55,56,68,91,115,117,121,131,137], and 𝑖𝑣) throttling row activations to limit the times a row can be activated within a refresh interval [27,56,130]. Many of these research proposals describe the details of their proposed mechanisms and discuss their security guarantees [56,91,130].…”
Section: Rowhammer Mitigation Mechanismsmentioning
confidence: 99%
See 3 more Smart Citations