HammerFilter: Robust Protection and Low Hardware Overhead Method for RowHammer
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Kwangrae | - |
dc.contributor.author | Woo, Jeonghyunas sup | - |
dc.contributor.author | Kim, Junsu | - |
dc.contributor.author | Chung, Ki Seok | - |
dc.date.accessioned | 2022-07-06T10:54:05Z | - |
dc.date.available | 2022-07-06T10:54:05Z | - |
dc.date.created | 2022-03-07 | - |
dc.date.issued | 2021-12 | - |
dc.identifier.issn | 1063-6404 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/140066 | - |
dc.description.abstract | The continuous scaling-down of the dynamic random access memory (DRAM) manufacturing process has made it possible to improve DRAM density. However, it makes small DRAM cells susceptible to electromagnetic interference between nearby cells. Unless DRAM cells are adequately isolated from each other, the frequent switching access of some cells may lead to unintended bit flips in adjacent cells. This phenomenon is commonly referred to as RowHammer. It is often considered a security issue because unusually frequent accesses to a small set of rows generated by malicious attacks can cause bit flips. Such bit flips may also be caused by general applications. Although several solutions have been proposed, most approaches either incur excessive area overhead or exhibit limited prevention capabilities against maliciously crafted attack patterns. Therefore, the goals of this study are (1) to mitigate RowHammer, even when the number of aggressor rows increases and attack patterns become complicated, and (2) to implement the method with a low area overhead.We propose a robust hardware-based protection method for RowHammer attacks with a low hardware cost called HammerFilter, which employs a modified version of the counting bloom filter. It tracks all attacking rows efficiently by leveraging the fact that the counting bloom filter is a space-efficient data structure, and we add an operation, HALF-DELETE, to mitigate the energy overhead. According to our experimental results, the proposed method can completely prevent bit flips when facing artificially crafted attack patterns (five patterns in our experiments), whereas state-of-the-art probabilistic solutions can only mitigate less than 56% of bit flips on average. Furthermore, the proposed method has a much lower area cost compared to existing counter-based solutions (40.6× better than TWiCe and 2.3× better than Graphene). | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | HammerFilter: Robust Protection and Low Hardware Overhead Method for RowHammer | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Chung, Ki Seok | - |
dc.identifier.doi | 10.1109/ICCD53106.2021.00043 | - |
dc.identifier.scopusid | 2-s2.0-85123929240 | - |
dc.identifier.wosid | 000763821700032 | - |
dc.identifier.bibliographicCitation | Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors, v.2021-October, pp.212 - 219 | - |
dc.relation.isPartOf | Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors | - |
dc.citation.title | Proceedings - IEEE International Conference on Computer Design: VLSI in Computers and Processors | - |
dc.citation.volume | 2021-October | - |
dc.citation.startPage | 212 | - |
dc.citation.endPage | 219 | - |
dc.type.rims | ART | - |
dc.type.docType | Proceedings Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | Cells | - |
dc.subject.keywordPlus | Cytology | - |
dc.subject.keywordPlus | Data structures | - |
dc.subject.keywordPlus | Dynamic random access storage | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Electromagnetic pulse | - |
dc.subject.keywordPlus | Area overhead | - |
dc.subject.keywordPlus | Attack patterns | - |
dc.subject.keywordPlus | Bit-flips | - |
dc.subject.keywordPlus | Counting bloom filters | - |
dc.subject.keywordPlus | Dynamic random access memory | - |
dc.subject.keywordPlus | Hardware overheads | - |
dc.subject.keywordPlus | Low area | - |
dc.subject.keywordPlus | Probabilistic methods | - |
dc.subject.keywordPlus | Random access | - |
dc.subject.keywordPlus | Rowhammer | - |
dc.subject.keywordAuthor | DRAM | - |
dc.subject.keywordAuthor | Hardware Security | - |
dc.subject.keywordAuthor | Probabilistic Method | - |
dc.subject.keywordAuthor | Reliability | - |
dc.subject.keywordAuthor | RowHammer | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/9643804 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.