Adaptive Row Activation and Refresh a Hybrid Approach to Mitigate RowHammer

0Citations
Citations of this article
N/AReaders
Mendeley users who have this article in their library.
Get full text

Abstract

RowHammer attack is an attack where an exploit is used to trigger a vulnerability in Dynamic Random Access Memory (DRAM). The attack is executed by repeatedly accessing a number of aggressor rows whereby this repeated access can induce bit flips in adjacent rows, leading to potential security breaches such as kernel access and privilege escalation. As the memory sizes increase, modern DRAM cells are getting increasingly dense over time. This phenomenon poses a significant threat to data integrity and system security. Although there are mitigation methods in existence, no method assures high security and high performance at the same time. This paper discusses two of the most widely used mitigation techniques: Target Row Refresh (TRR) and Probabilistic Adjacent Row Activation (PARA). Moreover, this paper proposes a hybrid mitigation approach, Adaptive Row Activation and Refresh (ARAR), which leverages the strengths of various existing mitigation methods. A comparative analysis in each section is performed to identify which approach delivers better performance and better security, while also identifying potential improvements for ARAR.

Cite

CITATION STYLE

APA

Demirseren, N. U., & Vakilinia, I. (2024). Adaptive Row Activation and Refresh a Hybrid Approach to Mitigate RowHammer. In 2024 IEEE 15th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2024 (pp. 471–476). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/UEMCON62879.2024.10754711

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free