Publication | Closed Access
SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling
33
Citations
57
References
2023
Year
Unknown Venue
Hardware SecurityRow HammerEngineeringInformation SecurityDram RowEmerging Memory TechnologyRh AttacksComputer EngineeringComputer ArchitectureComputer ScienceHardware Security SolutionSide-channel AttackParallel ComputingMemory ArchitectureData SecurityCryptography
As Row Hammer (RH) attacks have been a critical threat to computer systems, numerous hardware-based (HWbased) RH mitigation strategies have been proposed. However, the advent of non-adjacent RH attacks and lower RH thresholds significantly increase the area and performance overhead of these prior solutions due to their conservative design characteristics.We propose a new in-DRAM RH protection solution named Shuffling Aggressor DRAM Rows (SHADOW). SHADOW dynamically randomizes DRAM row mapping information, preventing an attacker from targeting a specific victim row that may hold critical data. SHADOW is robust against non-adjacent RH attacks because it utilizes the in-DRAM row-shuffle technique. To realize the in-DRAM row-shuffle operation with low performance and energy overhead, we use a novel DRAM microarchitecture optimization technique. We also utilize the recently introduced JEDEC RFM interface to enable in-DRAM RH mitigation without any DRAM interface changes. By exploiting an additional DRAM row per subarray, SHADOW does not require costly SRAM- or CAM-based tracking structures other than intrinsic counters for the RFM interface. We demonstrate the strong probabilistic protection of SHADOW against RH attacks through adversarial pattern analysis and highlight the compelling performance, area, and energy overheads compared to those of state-of-the-art HW-based RH prevention solutions.
| Year | Citations | |
|---|---|---|
2014 | 878 | |
1982 | 517 | |
2008 | 469 | |
2013 | 319 | |
2016 | 289 | |
2007 | 264 | |
2013 | 259 | |
2012 | 257 | |
2010 | 248 | |
2016 | 218 |
Page 1
Page 1