2020
DOI: 10.1109/tcad.2019.2915318
|View full text |Cite
|
Sign up to set email alerts
|

RowHammer: A Retrospective

Abstract: This retrospective paper describes the RowHammer problem in Dynamic Random Access Memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 conference [133]. RowHammer is a prime (and perhaps the first) example of how a circuit-level failure mechanism can cause a practical and widespread system security vulnerability. It is the phenomenon that repeatedly accessing a row in a modern DRAM chip causes bit flips in physically-adjacent rows at consistently predictable bit locations. RowHammer is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
145
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 162 publications
(147 citation statements)
references
References 186 publications
2
145
0
Order By: Relevance
“…Such approaches are regarded as competitive advantages by the DRAM manufacturers and so remain opaque to the users. The problem is that every mitigation up until now has been hacked [7], [11], [12] leaving all compute systems in jeopardy.…”
mentioning
confidence: 99%
“…Such approaches are regarded as competitive advantages by the DRAM manufacturers and so remain opaque to the users. The problem is that every mitigation up until now has been hacked [7], [11], [12] leaving all compute systems in jeopardy.…”
mentioning
confidence: 99%
“…SIMDRAM and other similar in-DRAM computation mechanisms that use dedicated DRAM rows to perform computation may increase vulnerability to RowHammer attacks [36,68,72,103,106]. We believe, and the literature suggests, that there should be robust and scalable solutions to RowHammer, orthogonally to our work (e.g., BlockHammer [150], PARA [71], TWiCe [86], Graphene [116]).…”
Section: Security Implicationsmentioning
confidence: 77%
“…Such refresh operations lead to higher memory access latency and energy consumption. Kim et al [49] have also demonstrated that contemporary DRAM designs suffer from problems such as susceptibility to RowHammer attacks [50], which exploit the limitations of charge-based memory to induce bit-flip errors. Solutions to overcome such attacks can further increase execution time and reduce the energy efficiency of DRAM PIM designs.…”
Section: Pim Using Nvmmentioning
confidence: 99%
“…On the other hand, alternative NVM memory technologies such as phase-change memory (PCM) [51][52][53][54], ReRAM [22,24,[55][56][57][58][59], and spintronic RAM [60][61][62][63][64][65][66] show promise. NVM eliminates the reliance on charge memory and represents the data as cell resistance values instead.…”
Section: Pim Using Nvmmentioning
confidence: 99%