Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/8264
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHassan, Hasan-
dc.contributor.authorTugrul, Yahya Can-
dc.contributor.authorRazavi, Kaveh-
dc.contributor.authorKim, Jeremie S.-
dc.contributor.authorMutlu, Onur-
dc.contributor.authorVan der Veen, Victor-
dc.date.accessioned2022-01-15T13:00:47Z-
dc.date.available2022-01-15T13:00:47Z-
dc.date.issued2021-
dc.identifier.isbn9781450385572-
dc.identifier.issn1072-4451-
dc.identifier.urihttps://doi.org/10.1145/3466752.3480110-
dc.descriptionRazavi, Kaveh/0000-0002-8588-7100;en_US
dc.description.abstractThe RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips rely on undocumented, proprietary, on-die mitigations, commonly known as Target Row Refresh (TRR). At a high level, TRR detects and refreshes potential RowHammer-victim rows, but its exact implementations are not openly disclosed. Security guarantees of TRR mechanisms cannot be easily studied due to their proprietary nature. To assess the security guarantees of recent DRAM chips, we present Uncovering TRR (U-TRR), an experimental methodology to analyze in-DRAM TRR implementations. U-TRR is based on the new observation that data retention failures in DRAM enable a side channel that leaks information on how TRR refreshes potential victim rows. U-TRR allows us to (i) understand how logical DRAM rows are laid out physically in silicon; (ii) study undocumented on-die TRR mechanisms; and (iii) combine (i) and (ii) to evaluate the RowHammer security guarantees of modern DRAM chips. We show how U-TRR allows us to craft RowHammer access patterns that successfully circumvent the TRR mechanisms employed in 45 DRAM modules of the three major DRAM vendors. We find that the DRAM modules we analyze are vulnerable to RowHammer, having bit flips in up to 99.9% of all DRAM rows.en_US
dc.description.sponsorshipNetherlands Organisation for Scientific Research [NWO 016.Veni.192.262]en_US
dc.description.sponsorshipWe thank the anonymous reviewers of MICRO 2021 for feedback. We thank the SAFARI Research Group members for valuable feedback and the stimulating intellectual environment they provide. We acknowledge the generous gifts provided by our industrial partners, especially Google, Huawei, Intel, Microsoft, and VMware. This work was also supported in part by the Netherlands Organisation for Scientific Research through grant NWO 016.Veni.192.262.en_US
dc.language.isoenen_US
dc.publisherAssoc Computing Machineryen_US
dc.relation.ispartof54th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) -- OCT 18-22, 2021 -- ELECTR NETWORKen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectDRAMen_US
dc.subjectRowhammeren_US
dc.subjectReliabilityen_US
dc.subjectSecurityen_US
dc.subjectTestingen_US
dc.titleUncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implicationsen_US
dc.typeConference Objecten_US
dc.relation.ispartofseriesInternational Symposium on Microarchitecture Proceedings-
dc.departmentTOBB University of Economics and Technologyen_US
dc.identifier.startpage1198en_US
dc.identifier.endpage1213en_US
dc.authoridRazavi, Kaveh/0000-0002-8588-7100-
dc.identifier.wosWOS:001118047400086-
dc.identifier.scopus2-s2.0-85116725151-
dc.institutionauthorTugrul, Yahya Can-
dc.identifier.doi10.1145/3466752.3480110-
dc.authorwosidPark, Jisung/Kfa-8003-2024-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
dc.description.woscitationindexConference Proceedings Citation Index - Science-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairetypeConference Object-
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:Elektrik ve Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

70
checked on Aug 23, 2025

Page view(s)

148
checked on Aug 25, 2025

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.