Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques

RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in 2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows. The RowHammer vulnerability has since garnered significant interest in both computer architecture and computer security...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) s. 638 - 651
Hlavní autoři: Kim, Jeremie S., Patel, Minesh, Yaglikci, A. Giray, Hassan, Hasan, Azizi, Roknoddin, Orosa, Lois, Mutlu, Onur
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.05.2020
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in 2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows. The RowHammer vulnerability has since garnered significant interest in both computer architecture and computer security research communities because it stems from physical circuit-level interference effects that worsen with continued DRAM density scaling. As DRAM manufacturers primarily depend on density scaling to increase DRAM capacity, future DRAM chips will likely be more vulnerable to RowHammer than those of the past. Many RowHammer mitigation mechanisms have been proposed by both industry and academia, but it is unclear whether these mechanisms will remain viable solutions for future devices, as their overheads increase with DRAM's vulnerability to RowHammer.In order to shed more light on how RowHammer affects modern and future devices at the circuit-level, we first present an experimental characterization of RowHammer on 1580 DRAM chips (408\timesDDR3, 652\timesDDR4, and 520\timesLPDDR4) from 300 DRAM modules (60\timesDDR3, 110\timesDDR4, and 130\timesLPDDR4) with RowHammer protection mechanisms disabled, spanning multiple different technology nodes from across each of the three major DRAM manufacturers. Our studies definitively show that newer DRAM chips are more vulnerable to RowHammer: as device feature size reduces, the number of activations needed to induce a RowHammer bit flip also reduces, to as few as 9.6 k (4.8k to two rows each) in the most vulnerable chip we tested.We evaluate five state-of-the-art RowHammer mitigation mechanisms using cycle-accurate simulation in the context of real data taken from our chips to study how the mitigation mechanisms scale with chip vulnerability. We find that existing mechanisms either are not scalable or suffer from prohibitively large performance overheads in projected future devices given our observed trends of RowHammer vulnerability. Thus, it is critical to research more effective solutions to RowHammer.
AbstractList RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in 2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows. The RowHammer vulnerability has since garnered significant interest in both computer architecture and computer security research communities because it stems from physical circuit-level interference effects that worsen with continued DRAM density scaling. As DRAM manufacturers primarily depend on density scaling to increase DRAM capacity, future DRAM chips will likely be more vulnerable to RowHammer than those of the past. Many RowHammer mitigation mechanisms have been proposed by both industry and academia, but it is unclear whether these mechanisms will remain viable solutions for future devices, as their overheads increase with DRAM's vulnerability to RowHammer.In order to shed more light on how RowHammer affects modern and future devices at the circuit-level, we first present an experimental characterization of RowHammer on 1580 DRAM chips (408\timesDDR3, 652\timesDDR4, and 520\timesLPDDR4) from 300 DRAM modules (60\timesDDR3, 110\timesDDR4, and 130\timesLPDDR4) with RowHammer protection mechanisms disabled, spanning multiple different technology nodes from across each of the three major DRAM manufacturers. Our studies definitively show that newer DRAM chips are more vulnerable to RowHammer: as device feature size reduces, the number of activations needed to induce a RowHammer bit flip also reduces, to as few as 9.6 k (4.8k to two rows each) in the most vulnerable chip we tested.We evaluate five state-of-the-art RowHammer mitigation mechanisms using cycle-accurate simulation in the context of real data taken from our chips to study how the mitigation mechanisms scale with chip vulnerability. We find that existing mechanisms either are not scalable or suffer from prohibitively large performance overheads in projected future devices given our observed trends of RowHammer vulnerability. Thus, it is critical to research more effective solutions to RowHammer.
Author Patel, Minesh
Yaglikci, A. Giray
Azizi, Roknoddin
Kim, Jeremie S.
Mutlu, Onur
Orosa, Lois
Hassan, Hasan
Author_xml – sequence: 1
  givenname: Jeremie S.
  surname: Kim
  fullname: Kim, Jeremie S.
  organization: ETH Zürich
– sequence: 2
  givenname: Minesh
  surname: Patel
  fullname: Patel, Minesh
  organization: ETH Zürich
– sequence: 3
  givenname: A. Giray
  surname: Yaglikci
  fullname: Yaglikci, A. Giray
  organization: ETH Zürich
– sequence: 4
  givenname: Hasan
  surname: Hassan
  fullname: Hassan, Hasan
  organization: ETH Zürich
– sequence: 5
  givenname: Roknoddin
  surname: Azizi
  fullname: Azizi, Roknoddin
  organization: ETH Zürich
– sequence: 6
  givenname: Lois
  surname: Orosa
  fullname: Orosa, Lois
  organization: ETH Zürich
– sequence: 7
  givenname: Onur
  surname: Mutlu
  fullname: Mutlu, Onur
  organization: ETH Zürich
BookMark eNotjs1OAjEURmuiiYI8gS76AmBv2-m07iaAQgIxQVyTOzO32AQ6OB1_eHsn0dWXszgn34BdxiYSY_cgJgDCPSxfp4XOjMsnUkgxEUJk7oINIJcWtDGQXbNRSqEUGjJlJcAN223oK6TQhbjnm-Z7gccjtY-8iHz-c6I2HCl2eOgZD-cUEm88Xzc1tZHPNsWaz3q7osQx1nzdV_bYhSbyLVXvMXx8UrplVx4PiUb_O2RvT_PtdDFevTwvp8VqjEpBN1al9XWlnRAlOied92iMIWFd5nKLQMbXtZcgKS-tLi1UHnVlsSR0IleghuzurxuIaHfqj2N73jlQ1mmtfgFUXlV9
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ISCA45697.2020.00059
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728146615
9781728146614
EndPage 651
ExternalDocumentID 9138944
Genre orig-research
GroupedDBID 6IE
6IH
ACM
ALMA_UNASSIGNED_HOLDINGS
APO
CBEJK
GUFHI
LHSKQ
RIE
RIO
ID FETCH-LOGICAL-a331t-3b8fdc4900ba9929ffa666e0895978a1e6fddf212e7b84b81cfa4c8abea907313
IEDL.DBID RIE
ISICitedReferencesCount 134
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000617734800048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 06 17:54:10 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a331t-3b8fdc4900ba9929ffa666e0895978a1e6fddf212e7b84b81cfa4c8abea907313
OpenAccessLink https://doi.org/10.48550/arxiv.2005.13121
PageCount 14
ParticipantIDs ieee_primary_9138944
PublicationCentury 2000
PublicationDate 2020-May
PublicationDateYYYYMMDD 2020-05-01
PublicationDate_xml – month: 05
  year: 2020
  text: 2020-May
PublicationDecade 2020
PublicationTitle 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)
PublicationTitleAbbrev ISCA
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib041538211
Score 2.532394
Snippet RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in 2014, where repeatedly accessing data in a DRAM row can cause bit...
SourceID ieee
SourceType Publisher
StartPage 638
SubjectTerms Computer architecture
Computer security
DRAM chips
Industries
Interference
Performance evaluation
Prevention and mitigation
Protection
Title Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques
URI https://ieeexplore.ieee.org/document/9138944
WOSCitedRecordID wos000617734800048&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED61FQMToBbxlgdGQpPYjW22qg_B0KoqRepW-Sl1SVAf8PexnaR0YGGLMiTS2cndd77v-wAeffs-TrnX2I9lRHosiSThMuJMe7dtjI0mwWyCTqdsueSzBjwduDDGmDB8Zp79ZTjL14Xa-1ZZl_tTNUKa0KQ0K7la9d4h_st1YKZixyUx7769D_quPODUocDUD3AFQdIjD5WQQsZn_3v5OXR-uXhodsgyF9AweRtW80AK9yPLaF58l-3nF9TP0ehIsR_ViiOosKg0PUPDeX-Chib8H5DINZqsS5WNIkeLWs9124GP8WgxeI0qq4RIYJzsIiyZ1YrwOJaCu4rHWuFwiYkZd4CBicRkVmvr0pShkhHJEmUFUUxIIxw6xgm-hFZe5OYKkEm1VUJSjV2tpTGVPHPPYrqXqkxJiq-h7YOz-izVMFZVXG7-vn0Lpz765YjgHbR2m725hxP1tVtvNw9hCX8AK8OdaQ
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LTsJAFL1BNNGVGjC-nYVLK21noDPuCEIgAiGICbtmngmb1vDQ33dmWpCFG3fNLNpkHr333LnnHIBHV74PY-Y09kMRkCaNAkGYCBhVzm0bY62IN5tIxmM6n7NJBZ52XBittW8-08_u0d_lq1xuXKmswdytGiEHcOics0q21nb3EHd2LZwp-XFRyBqD907bJggssTgwdi1cXpJ0z0XFB5He6f8-fwb1XzYemuzizDlUdFaDdOpp4a5pGU3z76IA_YLaGeruafajreYIyg0qbM_Q67Q9Qq_a_yEQzxQaLQqdjTxDs62i66oOH73urNMPSrOEgGMcrQMsqFGSsDAUnNmcxxhukYkOKbOQgfJIt4xSxgYqnQhKBI2k4URSLjS3-BhH-AKqWZ7pS0A6VkZykShssy2FE8Fa9l1UNWPZkiLBV1Bzk5N-FnoYaTkv138PP8BxfzYapsPB-O0GTtxKFA2Dt1BdLzf6Do7k13qxWt775fwBjMegsg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+ACM%2FIEEE+47th+Annual+International+Symposium+on+Computer+Architecture+%28ISCA%29&rft.atitle=Revisiting+RowHammer%3A+An+Experimental+Analysis+of+Modern+DRAM+Devices+and+Mitigation+Techniques&rft.au=Kim%2C+Jeremie+S.&rft.au=Patel%2C+Minesh&rft.au=Yaglikci%2C+A.+Giray&rft.au=Hassan%2C+Hasan&rft.date=2020-05-01&rft.pub=IEEE&rft.spage=638&rft.epage=651&rft_id=info:doi/10.1109%2FISCA45697.2020.00059&rft.externalDocID=9138944