As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows), attackers can exploit inter-cell interference through Row Hammer to flip bits in neighboring rows (victim rows). A recent work, called Randomized Row-Swap (RRS), proposed proactively swapping aggressor rows with randomly selected rows before an aggressor row can cause Row Hammer. Our paper observes that RRS is neither secure nor scalable. We first propose the `Juggernaut attack pattern' that breaks RRS in under 1 day. Juggernaut exploits the fact that the mitigative action of RRS, a swap operation, can itself induce additional target row activations, defeating such a defense. ...
This is the artifact (software) accompanying our HPCA paper, "Scalable and Secure Row-Swap: Efficien...
Run-time attacks pose a continuous threat to the security of computer systems. These attacks aim at...
Modern applications on general purpose processors require both rapid and power-efficient computing a...
Modern systems mitigate Rowhammer using victim refresh, which refreshes the two neighbours of an agg...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Row hammering is a type of memory exploit where a malicious application repeatedly causes transistor...
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowH...
We present the new class of non-uniform Rowhammer access patterns that bypass undocumented, propriet...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer vulnerability continues to get worse, with the Rowhammer Threshold (TRH) reducing from...
The DRAM substrate is becoming increasingly more vulnerable to Rowhammer as we move to smaller techn...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
This is the artifact (software) accompanying our HPCA paper, "Scalable and Secure Row-Swap: Efficien...
Run-time attacks pose a continuous threat to the security of computer systems. These attacks aim at...
Modern applications on general purpose processors require both rapid and power-efficient computing a...
Modern systems mitigate Rowhammer using victim refresh, which refreshes the two neighbours of an agg...
Row hammer in dynamic random access memories (DRAM) is an effect by which repeatedly activating a ro...
Row hammering is a type of memory exploit where a malicious application repeatedly causes transistor...
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowH...
We present the new class of non-uniform Rowhammer access patterns that bypass undocumented, propriet...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software,...
The Rowhammer vulnerability continues to get worse, with the Rowhammer Threshold (TRH) reducing from...
The DRAM substrate is becoming increasingly more vulnerable to Rowhammer as we move to smaller techn...
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what w...
As the information density of DRAM increases, the problems faced by natural decay and cell leakage h...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
This is the artifact (software) accompanying our HPCA paper, "Scalable and Secure Row-Swap: Efficien...
Run-time attacks pose a continuous threat to the security of computer systems. These attacks aim at...
Modern applications on general purpose processors require both rapid and power-efficient computing a...