Rowpress: Amplifying read disturbance in modern dram chips
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
Rega: Scalable rowhammer mitigation with refresh-generating activations
Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM
rows before bits start to flip. These refreshes are scarce and can only happen periodically …
rows before bits start to flip. These refreshes are scarce and can only happen periodically …
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …
Shadow: Preventing row hammer in dram with intra-subarray row shuffling
As Row Hammer (RH) attacks have been a critical threat to computer systems, numerous
hardware-based (HWbased) RH mitigation strategies have been proposed. However, the …
hardware-based (HWbased) RH mitigation strategies have been proposed. However, the …
Fundamentally understanding and solving rowhammer
We provide an overview of recent developments and future directions in the RowHammer
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …
Jolt: Recovering tls signing keys via rowhammer faults
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …
Scalable and secure row-swap: Efficient and safe row hammer mitigation in memory systems
As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly
susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows) …
susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows) …
Hammerscope: Observing dram power consumption using rowhammer
The constant reduction in memory cell sizes has increased memory density and reduced
power consumption, but has also affected its reliability. The Rowhammer attack exploits this …
power consumption, but has also affected its reliability. The Rowhammer attack exploits this …
Pride: Achieving secure rowhammer mitigation with low-cost in-dram trackers
Rowhammer-induced bit-flips are a threat to DRAM security. To mitigate Rowhammer,
DDR4 devices employ TRR, an in-DRAM tracker, to identify aggressor rows. In-DRAM …
DDR4 devices employ TRR, an in-DRAM tracker, to identify aggressor rows. In-DRAM …
HiRA: Hidden row activation for reducing refresh latency of off-the-shelf DRAM chips
DRAM is the building block of modern main memory systems. DRAM cells must be
periodically refreshed to prevent data loss. Refresh operations degrade system performance …
periodically refreshed to prevent data loss. Refresh operations degrade system performance …