Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/8264
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hassan, Hasan | - |
dc.contributor.author | Tugrul, Yahya Can | - |
dc.contributor.author | Razavi, Kaveh | - |
dc.contributor.author | Kim, Jeremie S. | - |
dc.contributor.author | Mutlu, Onur | - |
dc.contributor.author | Van der Veen, Victor | - |
dc.date.accessioned | 2022-01-15T13:00:47Z | - |
dc.date.available | 2022-01-15T13:00:47Z | - |
dc.date.issued | 2021 | - |
dc.identifier.isbn | 9781450385572 | - |
dc.identifier.issn | 1072-4451 | - |
dc.identifier.uri | https://doi.org/10.1145/3466752.3480110 | - |
dc.description | Razavi, Kaveh/0000-0002-8588-7100; | en_US |
dc.description.abstract | The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips rely on undocumented, proprietary, on-die mitigations, commonly known as Target Row Refresh (TRR). At a high level, TRR detects and refreshes potential RowHammer-victim rows, but its exact implementations are not openly disclosed. Security guarantees of TRR mechanisms cannot be easily studied due to their proprietary nature. To assess the security guarantees of recent DRAM chips, we present Uncovering TRR (U-TRR), an experimental methodology to analyze in-DRAM TRR implementations. U-TRR is based on the new observation that data retention failures in DRAM enable a side channel that leaks information on how TRR refreshes potential victim rows. U-TRR allows us to (i) understand how logical DRAM rows are laid out physically in silicon; (ii) study undocumented on-die TRR mechanisms; and (iii) combine (i) and (ii) to evaluate the RowHammer security guarantees of modern DRAM chips. We show how U-TRR allows us to craft RowHammer access patterns that successfully circumvent the TRR mechanisms employed in 45 DRAM modules of the three major DRAM vendors. We find that the DRAM modules we analyze are vulnerable to RowHammer, having bit flips in up to 99.9% of all DRAM rows. | en_US |
dc.description.sponsorship | Netherlands Organisation for Scientific Research [NWO 016.Veni.192.262] | en_US |
dc.description.sponsorship | We thank the anonymous reviewers of MICRO 2021 for feedback. We thank the SAFARI Research Group members for valuable feedback and the stimulating intellectual environment they provide. We acknowledge the generous gifts provided by our industrial partners, especially Google, Huawei, Intel, Microsoft, and VMware. This work was also supported in part by the Netherlands Organisation for Scientific Research through grant NWO 016.Veni.192.262. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Assoc Computing Machinery | en_US |
dc.relation.ispartof | 54th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO) -- OCT 18-22, 2021 -- ELECTR NETWORK | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | DRAM | en_US |
dc.subject | Rowhammer | en_US |
dc.subject | Reliability | en_US |
dc.subject | Security | en_US |
dc.subject | Testing | en_US |
dc.title | Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications | en_US |
dc.type | Conference Object | en_US |
dc.relation.ispartofseries | International Symposium on Microarchitecture Proceedings | - |
dc.department | TOBB University of Economics and Technology | en_US |
dc.identifier.startpage | 1198 | en_US |
dc.identifier.endpage | 1213 | en_US |
dc.authorid | Razavi, Kaveh/0000-0002-8588-7100 | - |
dc.identifier.wos | WOS:001118047400086 | - |
dc.identifier.scopus | 2-s2.0-85116725151 | - |
dc.institutionauthor | Tugrul, Yahya Can | - |
dc.identifier.doi | 10.1145/3466752.3480110 | - |
dc.authorwosid | Park, Jisung/Kfa-8003-2024 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
dc.description.woscitationindex | Conference Proceedings Citation Index - Science | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | none | - |
item.openairetype | Conference Object | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
Appears in Collections: | Elektrik ve Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
70
checked on Aug 23, 2025
Page view(s)
148
checked on Aug 25, 2025
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.