Loading…

TWiCe: preventing row-hammering by exploiting time window counters

Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones. There have been a number of proposals to prevent RH, but they either incur large area overhead, suffer from noticeabl...

Full description

Saved in:
Bibliographic Details
Main Authors: Lee, Eojin, Kang, Ingab, Lee, Sukhan, Suh, G. Edward, Ahn, Jung Ho
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 396
container_issue
container_start_page 385
container_title
container_volume
creator Lee, Eojin
Kang, Ingab
Lee, Sukhan
Suh, G. Edward
Ahn, Jung Ho
description Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones. There have been a number of proposals to prevent RH, but they either incur large area overhead, suffer from noticeable performance drop on adversarial memory access patterns, or provide probabilistic protection with no capability to detect attacks. In this paper, we propose a new counter-based RH prevention solution named Time Window Counter (TWiCe) based row refresh, which accurately detects potential RH attacks only using a small number of counters with a minimal performance impact. We first make a key observation that the number of rows that can cause RH is limited by the maximum values of row activation frequency and DRAM cell retention time. We calculate the maximum number of required counter entries per DRAM bank, with which TWiCe prevents RH with a strong deterministic guarantee. We leverage pseudo-associative cache design and separate the TWiCe table to further reduce area and energy overheads. TWiCe incurs no performance overhead on normal DRAM operations and less than 0.7% area and energy overheads over contemporary DRAM devices. Our evaluation shows that TWiCe makes no more than 0.006% of additional DRAM row activations for adversarial memory access patterns including RH attack scenarios.
doi_str_mv 10.1145/3307650.3322232
format conference_proceeding
fullrecord <record><control><sourceid>acm_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8980327</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8980327</ieee_id><sourcerecordid>acm_books_10_1145_3307650_3322232</sourcerecordid><originalsourceid>FETCH-LOGICAL-a247t-eea5f9997a7707001217293e13af2c6dec74d4c24c73de8ae7fdb8a4b6ea4abd3</originalsourceid><addsrcrecordid>eNqNz0FLw0AQhuFVKVhqzh78A14SZ2c2O7tHCWqFgpdKe1smyQSilkrixX9vpDl58jSH52PgNebaQmGtK--IgH0JBREiEp6ZLHKYAMh7H925WWLJZc6W9hd_7NJk4_gGABjYTrA0i-2ur_TKLDr5GDWb78q8Pj5sq3W-eXl6ru43uaDjr1xVyi7GyMIMDGDRMkZSS9Jh41tt2LWuQdcwtRpEuWvrIK72Kk7qllbm5vS3V9X0OfQHGb5TiAEIedLbk0pzSPXx-D4mC-m3Oc3NaW6epsU_p6keeu3oB5SlT1I</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>TWiCe: preventing row-hammering by exploiting time window counters</title><source>IEEE Xplore All Conference Series</source><creator>Lee, Eojin ; Kang, Ingab ; Lee, Sukhan ; Suh, G. Edward ; Ahn, Jung Ho</creator><creatorcontrib>Lee, Eojin ; Kang, Ingab ; Lee, Sukhan ; Suh, G. Edward ; Ahn, Jung Ho</creatorcontrib><description>Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones. There have been a number of proposals to prevent RH, but they either incur large area overhead, suffer from noticeable performance drop on adversarial memory access patterns, or provide probabilistic protection with no capability to detect attacks. In this paper, we propose a new counter-based RH prevention solution named Time Window Counter (TWiCe) based row refresh, which accurately detects potential RH attacks only using a small number of counters with a minimal performance impact. We first make a key observation that the number of rows that can cause RH is limited by the maximum values of row activation frequency and DRAM cell retention time. We calculate the maximum number of required counter entries per DRAM bank, with which TWiCe prevents RH with a strong deterministic guarantee. We leverage pseudo-associative cache design and separate the TWiCe table to further reduce area and energy overheads. TWiCe incurs no performance overhead on normal DRAM operations and less than 0.7% area and energy overheads over contemporary DRAM devices. Our evaluation shows that TWiCe makes no more than 0.006% of additional DRAM row activations for adversarial memory access patterns including RH attack scenarios.</description><identifier>ISBN: 9781450366694</identifier><identifier>ISBN: 1450366694</identifier><identifier>EISSN: 2575-713X</identifier><identifier>EISBN: 9781450366694</identifier><identifier>EISBN: 1450366694</identifier><identifier>DOI: 10.1145/3307650.3322232</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Computer systems organization ; Computer systems organization -- Dependable and fault-tolerant systems and networks ; Computer systems organization -- Dependable and fault-tolerant systems and networks -- Processors and memory architectures ; Hardware ; Hardware -- Integrated circuits ; Hardware -- Integrated circuits -- Semiconductor memory ; Information systems ; Information systems -- Information storage systems ; Information systems -- Information storage systems -- Information storage technologies ; Security and privacy ; Security and privacy -- Security in hardware ; Security and privacy -- Security in hardware -- Hardware attacks and countermeasures ; Security and privacy -- Security in hardware -- Hardware attacks and countermeasures -- Side-channel analysis and countermeasures ; Security and privacy -- Security in hardware -- Tamper-proof and tamper-resistant designs ; Security and privacy -- Systems security</subject><ispartof>2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA), 2019, p.385-396</ispartof><rights>2019 ACM</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8980327$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8980327$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lee, Eojin</creatorcontrib><creatorcontrib>Kang, Ingab</creatorcontrib><creatorcontrib>Lee, Sukhan</creatorcontrib><creatorcontrib>Suh, G. Edward</creatorcontrib><creatorcontrib>Ahn, Jung Ho</creatorcontrib><title>TWiCe: preventing row-hammering by exploiting time window counters</title><title>2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA)</title><addtitle>ISCA</addtitle><description>Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones. There have been a number of proposals to prevent RH, but they either incur large area overhead, suffer from noticeable performance drop on adversarial memory access patterns, or provide probabilistic protection with no capability to detect attacks. In this paper, we propose a new counter-based RH prevention solution named Time Window Counter (TWiCe) based row refresh, which accurately detects potential RH attacks only using a small number of counters with a minimal performance impact. We first make a key observation that the number of rows that can cause RH is limited by the maximum values of row activation frequency and DRAM cell retention time. We calculate the maximum number of required counter entries per DRAM bank, with which TWiCe prevents RH with a strong deterministic guarantee. We leverage pseudo-associative cache design and separate the TWiCe table to further reduce area and energy overheads. TWiCe incurs no performance overhead on normal DRAM operations and less than 0.7% area and energy overheads over contemporary DRAM devices. Our evaluation shows that TWiCe makes no more than 0.006% of additional DRAM row activations for adversarial memory access patterns including RH attack scenarios.</description><subject>Computer systems organization</subject><subject>Computer systems organization -- Dependable and fault-tolerant systems and networks</subject><subject>Computer systems organization -- Dependable and fault-tolerant systems and networks -- Processors and memory architectures</subject><subject>Hardware</subject><subject>Hardware -- Integrated circuits</subject><subject>Hardware -- Integrated circuits -- Semiconductor memory</subject><subject>Information systems</subject><subject>Information systems -- Information storage systems</subject><subject>Information systems -- Information storage systems -- Information storage technologies</subject><subject>Security and privacy</subject><subject>Security and privacy -- Security in hardware</subject><subject>Security and privacy -- Security in hardware -- Hardware attacks and countermeasures</subject><subject>Security and privacy -- Security in hardware -- Hardware attacks and countermeasures -- Side-channel analysis and countermeasures</subject><subject>Security and privacy -- Security in hardware -- Tamper-proof and tamper-resistant designs</subject><subject>Security and privacy -- Systems security</subject><issn>2575-713X</issn><isbn>9781450366694</isbn><isbn>1450366694</isbn><isbn>9781450366694</isbn><isbn>1450366694</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqNz0FLw0AQhuFVKVhqzh78A14SZ2c2O7tHCWqFgpdKe1smyQSilkrixX9vpDl58jSH52PgNebaQmGtK--IgH0JBREiEp6ZLHKYAMh7H925WWLJZc6W9hd_7NJk4_gGABjYTrA0i-2ur_TKLDr5GDWb78q8Pj5sq3W-eXl6ru43uaDjr1xVyi7GyMIMDGDRMkZSS9Jh41tt2LWuQdcwtRpEuWvrIK72Kk7qllbm5vS3V9X0OfQHGb5TiAEIedLbk0pzSPXx-D4mC-m3Oc3NaW6epsU_p6keeu3oB5SlT1I</recordid><startdate>20190622</startdate><enddate>20190622</enddate><creator>Lee, Eojin</creator><creator>Kang, Ingab</creator><creator>Lee, Sukhan</creator><creator>Suh, G. Edward</creator><creator>Ahn, Jung Ho</creator><general>ACM</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20190622</creationdate><title>TWiCe</title><author>Lee, Eojin ; Kang, Ingab ; Lee, Sukhan ; Suh, G. Edward ; Ahn, Jung Ho</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a247t-eea5f9997a7707001217293e13af2c6dec74d4c24c73de8ae7fdb8a4b6ea4abd3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer systems organization</topic><topic>Computer systems organization -- Dependable and fault-tolerant systems and networks</topic><topic>Computer systems organization -- Dependable and fault-tolerant systems and networks -- Processors and memory architectures</topic><topic>Hardware</topic><topic>Hardware -- Integrated circuits</topic><topic>Hardware -- Integrated circuits -- Semiconductor memory</topic><topic>Information systems</topic><topic>Information systems -- Information storage systems</topic><topic>Information systems -- Information storage systems -- Information storage technologies</topic><topic>Security and privacy</topic><topic>Security and privacy -- Security in hardware</topic><topic>Security and privacy -- Security in hardware -- Hardware attacks and countermeasures</topic><topic>Security and privacy -- Security in hardware -- Hardware attacks and countermeasures -- Side-channel analysis and countermeasures</topic><topic>Security and privacy -- Security in hardware -- Tamper-proof and tamper-resistant designs</topic><topic>Security and privacy -- Systems security</topic><toplevel>online_resources</toplevel><creatorcontrib>Lee, Eojin</creatorcontrib><creatorcontrib>Kang, Ingab</creatorcontrib><creatorcontrib>Lee, Sukhan</creatorcontrib><creatorcontrib>Suh, G. Edward</creatorcontrib><creatorcontrib>Ahn, Jung Ho</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lee, Eojin</au><au>Kang, Ingab</au><au>Lee, Sukhan</au><au>Suh, G. Edward</au><au>Ahn, Jung Ho</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>TWiCe: preventing row-hammering by exploiting time window counters</atitle><btitle>2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA)</btitle><stitle>ISCA</stitle><date>2019-06-22</date><risdate>2019</risdate><spage>385</spage><epage>396</epage><pages>385-396</pages><eissn>2575-713X</eissn><isbn>9781450366694</isbn><isbn>1450366694</isbn><eisbn>9781450366694</eisbn><eisbn>1450366694</eisbn><abstract>Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones. There have been a number of proposals to prevent RH, but they either incur large area overhead, suffer from noticeable performance drop on adversarial memory access patterns, or provide probabilistic protection with no capability to detect attacks. In this paper, we propose a new counter-based RH prevention solution named Time Window Counter (TWiCe) based row refresh, which accurately detects potential RH attacks only using a small number of counters with a minimal performance impact. We first make a key observation that the number of rows that can cause RH is limited by the maximum values of row activation frequency and DRAM cell retention time. We calculate the maximum number of required counter entries per DRAM bank, with which TWiCe prevents RH with a strong deterministic guarantee. We leverage pseudo-associative cache design and separate the TWiCe table to further reduce area and energy overheads. TWiCe incurs no performance overhead on normal DRAM operations and less than 0.7% area and energy overheads over contemporary DRAM devices. Our evaluation shows that TWiCe makes no more than 0.006% of additional DRAM row activations for adversarial memory access patterns including RH attack scenarios.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/3307650.3322232</doi><tpages>12</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781450366694
ispartof 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA), 2019, p.385-396
issn 2575-713X
language eng
recordid cdi_ieee_primary_8980327
source IEEE Xplore All Conference Series
subjects Computer systems organization
Computer systems organization -- Dependable and fault-tolerant systems and networks
Computer systems organization -- Dependable and fault-tolerant systems and networks -- Processors and memory architectures
Hardware
Hardware -- Integrated circuits
Hardware -- Integrated circuits -- Semiconductor memory
Information systems
Information systems -- Information storage systems
Information systems -- Information storage systems -- Information storage technologies
Security and privacy
Security and privacy -- Security in hardware
Security and privacy -- Security in hardware -- Hardware attacks and countermeasures
Security and privacy -- Security in hardware -- Hardware attacks and countermeasures -- Side-channel analysis and countermeasures
Security and privacy -- Security in hardware -- Tamper-proof and tamper-resistant designs
Security and privacy -- Systems security
title TWiCe: preventing row-hammering by exploiting time window counters
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T14%3A04%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=TWiCe:%20preventing%20row-hammering%20by%20exploiting%20time%20window%20counters&rft.btitle=2019%20ACM/IEEE%2046th%20Annual%20International%20Symposium%20on%20Computer%20Architecture%20(ISCA)&rft.au=Lee,%20Eojin&rft.date=2019-06-22&rft.spage=385&rft.epage=396&rft.pages=385-396&rft.eissn=2575-713X&rft.isbn=9781450366694&rft.isbn_list=1450366694&rft_id=info:doi/10.1145/3307650.3322232&rft.eisbn=9781450366694&rft.eisbn_list=1450366694&rft_dat=%3Cacm_CHZPO%3Eacm_books_10_1145_3307650_3322232%3C/acm_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-a247t-eea5f9997a7707001217293e13af2c6dec74d4c24c73de8ae7fdb8a4b6ea4abd3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8980327&rfr_iscdi=true