2018
DOI: 10.1007/s41635-018-0047-0
|View full text |Cite
|
Sign up to set email alerts
|

SRASA: a Generalized Theoretical Framework for Security and Reliability Analysis in Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…Number of 64-bit words with X errors There are many other works that propose long-term solutions [28,30,40,68,81,82,88,111,128,134,152,213,222,226,243,245], building on our original work. [226] uses a probabilistic mechanism similar to PARA in the original RowHammer paper in addition to a small stack for maintaining access history information to determine whether adjacent rows need to be refreshed to avoid bit flips.…”
Section: Modulementioning
confidence: 99%
“…Number of 64-bit words with X errors There are many other works that propose long-term solutions [28,30,40,68,81,82,88,111,128,134,152,213,222,226,243,245], building on our original work. [226] uses a probabilistic mechanism similar to PARA in the original RowHammer paper in addition to a small stack for maintaining access history information to determine whether adjacent rows need to be refreshed to avoid bit flips.…”
Section: Modulementioning
confidence: 99%
“…Proposals for mitigating and/or preventing Rowhammer errors abound in both academia [5], [67], [102], [14], [56], [104], [29], [111], [80], [15], [7], [6], [9], [8], [34], [74], [58], [30], [63], [73], [99], [112] and industry [4], [39], [82], [24]; see [89] for a detailed survey of these works. However, while DRAM manufacturers claim that modern DRAM devices are resilient to Rowhammer bit-flips [81], [33], it is unclear what causes this resilience and under what conditions the Rowhammer-prevention mechanism may fail.…”
Section: The Rowhammer Threatmentioning
confidence: 99%
“…Many prior works build upon the Rowhammer phenomenon [88], [69], [89] for both attacks [32], [101], [97], [110], [37], [25], [36], [106], [83], [114], [13], [96], [11], [59], [95], [2], [105], [94], [16], [18], [10], [118], [12], [22], [62], [76] and defenses [4], [39], [82], [24], [5], [67], [102], [14], [56], [104], [29], [111], [80], [15], [7], [6], [9], [8], [34], [74], [58],…”
Section: Related Workmentioning
confidence: 99%
“…and software (e.g., [13,16,41,170,178,198,341,197,124,135,43,86,358,36,169,351,49,350]) levels. DRAM manufacturers themselves employ in-DRAM RowHammer prevention mechanisms such as Target Row Refresh (TRR) [139], which internally performs proprietary operations to reduce the vulnerability of a DRAM chip against potential RowHammer attacks, although these solutions have been recently shown to be vulnerable [87].…”
Section: Rowhammer: Dram Disturbance Errorsmentioning
confidence: 99%
“…While their analysis identifies a likely explanation for the failure mechanism responsible for RowHammer, they do not present experimental data taken from real devices to support their conclusions. [372,303,16,178,341,41,170,159,135,99,194,43,23,25,28,103,26,24,13,124,197,86,118,358,36,169,351,83,49,198,350] propose RowHammer mitigation techniques. Additionally, several patents for RowHammer prevention mechanisms have been filed [24,25,28,26,23,102].…”
Section: Real Chip Studiesmentioning
confidence: 99%