Rowhammer Attacks in Dynamic Random-Access Memory and Defense Methodsopen access
- Authors
- Kim, Dayeon; Park, Hyungdong; Yeo, Inguk; Lee, Youn Kyu; Kim, Youngmin; Lee, Hyung-Min; Kwon, Kon-Woo
- Issue Date
- 17-Jan-2024
- Publisher
- Multidisciplinary Digital Publishing Institute (MDPI)
- Keywords
- dynamic random-access memory; rowhammer; security; vulnerability
- Citation
- Sensors, v.24, no.2
- Journal Title
- Sensors
- Volume
- 24
- Number
- 2
- URI
- https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/32626
- DOI
- 10.3390/s24020592
- ISSN
- 1424-8220
1424-3210
- Abstract
- This paper provides a comprehensive overview of the security vulnerability known as rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many desirable advantages, including low latency, high density, and cost-effectiveness, rowhammer vulnerability, first identified in 2014, poses a significant threat to computing systems. Rowhammer attacks involve repetitive access to specific DRAM rows, which can cause bit flips in neighboring rows, potentially compromising system credentials, integrity, and availability. The paper discusses the various stages of rowhammer attacks, explores existing attack techniques, and examines defense strategies. It also emphasizes the importance of understanding DRAM organization and the associated security challenges. © 2024 by the authors.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > School of Electronic & Electrical Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.