Improving the effectiveness of Row-Sampling methods to protect against Row-Hummer attacks
Abstract
Purpose: to analyze the protection of systems against RowHammer attacks based on the row sampling method and to propose its improvement using a more realistic memory model and attack model.
Findings: shortcomings in the representation of memory in protection mechanisms based on row sampling are shown and more correct methods for calculating the sampling threshold are shown. The results are presented on real examples of improving DRAM memory protection.
Practical implications: The formulas found can significantly improve the protection of new types of DRAM memory against Rowhammer attacks.
Value: testing data of new memory chips from several DRAM manufacturers is presented. New types of threshold calculation for protection against RowHammer are also presented.
Future research: this research opens up ways to improve software methods for protection against RowHammer and also suggests the development of technical means for combinations with software solutions.
Downloads
References
Lin, J. and Garrett, M. “Handling Maximum Activation Count Limit and Target Row Refresh in DDR4 SDRAM,” Patent No. US 2015/0200002 A1, 2015
Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J. H., Lee, D., Wilkerson, C., Lai, K. and Mutlu, O. “Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors,” in ISCA, 2014. https://doi.org/10.1109/ISCA.2014.6853210.
Kim, D.-H., Nair, P. J. and Qureshi, M. K. “Architectural Support for Mitigating Row Hammering in DRAM Memories,” CAL, 2015. https://doi.org/10.1109/LCA.2014.2332177.
Frigo, P., Vannacci, E., Hassan, H., V. van der Veen, O. Mutlu, C. Giuffrida, H. Bos, and K. Razavi, “TRRespass: Exploiting the Many Sides of Target Row Refresh,” in S&P, 2020 https://doi.org/10.1007/978-3-031-64171-8_24.
Kaczmarski, M. “Thoughts on Intel Xeon E5-2600 v2 Product Performance Optimisation,” 2014
Mazurok, V., & Lutsenko, V. (2024). An analytical overview and trend analysis of RowHummer vulnerabilities for various DRAM vendors. Social Development and Security, 14(3), 238-244. https://doi.org/10.33445/sds.2024.14.3.16
Kim, M., Choi, J., Kim, H. and Lee, H.-J. “An Effective DRAM Address Remapping for Mitigating Rowhammer Errors,” in TC, 2019. https://doi.org/10.1109/TC.2019.2907248.
Abstract views: 38 PDF Downloads: 25
Copyright (c) 2024 Valentyn Mazurok, Volodymyr Lutsenko

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).