Proceedings of the Workshop on Hot Topics in Operating Systems 2021
DOI: 10.1145/3458336.3465295
|View full text |Cite
|
Sign up to set email alerts
|

Stop! Hammer time

Abstract: Rowhammer attacks exploit electromagnetic interference among nearby DRAM cells to flip bits, corrupting data and altering system behavior. Unfortunately, DRAM vendors have opted for a blackbox approach to preventing these bit flips, exposing little information about in-DRAM mitigations. Despite vendor claims that their mitigations prevent Rowhammer, recent work bypasses these defenses to corrupt data. Further work shows that the Rowhammer problem is actually worsening in emerging DRAM and posits that system-le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 46 publications
1
3
0
Order By: Relevance
“…Unfortunately, similar to efforts that improve DRAM access latency and refresh timings discussed in Sections 4.2.2 and 4.1.2, deploying these methods in practice is impractical for most consumers. These observations are consistent with prior works [45,46,231] that discuss the difficulty in practically determining and relying on this information without support from DRAM manufacturers.…”
Section: Application To Today's Commodity Dram Chipssupporting
confidence: 91%
See 2 more Smart Citations
“…Unfortunately, similar to efforts that improve DRAM access latency and refresh timings discussed in Sections 4.2.2 and 4.1.2, deploying these methods in practice is impractical for most consumers. These observations are consistent with prior works [45,46,231] that discuss the difficulty in practically determining and relying on this information without support from DRAM manufacturers.…”
Section: Application To Today's Commodity Dram Chipssupporting
confidence: 91%
“…Although stronger in-DRAM error mitigations are effective against growing error rates [142,224], they introduce new overheads and challenges for consumers. For example, neither on-die ECC nor target row refresh correct all errors, and the remaining errors (e.g., uncorrectable errors) are difficult for consumers to predict and mitigate because their manifestation depends on the particular on-die ECC and/or TRR mechanism used by a given chip [23,32,38,40,41,46,115,152,229,231]. As a result, DRAM consumers face errors that are growing in both magnitude and complexity, making reliability a key design concern for continued DRAM scaling.…”
Section: Breakdown Of the Separation Of Concernsmentioning
confidence: 99%
See 1 more Smart Citation
“…Key Problem. Many prior works (e.g., [1,98,102,106,107,110,112,116,117,125,134,135]) propose using a set of counters to track the activation counts of potential aggressor rows (counter-based mechanisms). Using counters to determine rows that reach close to RowHammer thresholds and taking mitigating actions accordingly can prevent RowHammer bitflips at low performance and energy overheads.…”
Section: Introductionmentioning
confidence: 99%