Rowpress: Amplifying read disturbance in modern dram chips

H Luo, A Olgun, AG Yağlıkçı, YC Tuğrul… - Proceedings of the 50th …, 2023 - dl.acm.org
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …

Rega: Scalable rowhammer mitigation with refresh-generating activations

M Marazzi, F Solt, P Jattke, K Takashi… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Mitigating Rowhammer requires performing additional refresh operations to recharge DRAM
rows before bits start to flip. These refreshes are scarce and can only happen periodically …

CSI: Rowhammer–Cryptographic security and integrity against rowhammer

J Juffinger, L Lamster, A Kogler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …

Shadow: Preventing row hammer in dram with intra-subarray row shuffling

M Wi, J Park, S Ko, MJ Kim, NS Kim… - … Symposium on High …, 2023 - ieeexplore.ieee.org
As Row Hammer (RH) attacks have been a critical threat to computer systems, numerous
hardware-based (HWbased) RH mitigation strategies have been proposed. However, the …

Fundamentally understanding and solving rowhammer

O Mutlu, A Olgun, AG Yağlıkcı - Proceedings of the 28th Asia and South …, 2023 - dl.acm.org
We provide an overview of recent developments and future directions in the RowHammer
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …

Jolt: Recovering tls signing keys via rowhammer faults

K Mus, Y Doröz, MC Tol, K Rahman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …

Scalable and secure row-swap: Efficient and safe row hammer mitigation in memory systems

J Woo, G Saileshwar, PJ Nair - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly
susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows) …

Hammerscope: Observing dram power consumption using rowhammer

Y Cohen, KS Tharayil, A Haenel, D Genkin… - Proceedings of the …, 2022 - dl.acm.org
The constant reduction in memory cell sizes has increased memory density and reduced
power consumption, but has also affected its reliability. The Rowhammer attack exploits this …

Pride: Achieving secure rowhammer mitigation with low-cost in-dram trackers

A Jaleel, G Saileshwar, SW Keckler… - 2024 ACM/IEEE 51st …, 2024 - ieeexplore.ieee.org
Rowhammer-induced bit-flips are a threat to DRAM security. To mitigate Rowhammer,
DDR4 devices employ TRR, an in-DRAM tracker, to identify aggressor rows. In-DRAM …

HiRA: Hidden row activation for reducing refresh latency of off-the-shelf DRAM chips

AG Yağlikçi, A Olgun, M Patel, H Luo… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
DRAM is the building block of modern main memory systems. DRAM cells must be
periodically refreshed to prevent data loss. Refresh operations degrade system performance …