Title
Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques
Abstract
RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in 2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows. The RowHammer vulnerability has since garnered significant interest in both computer architecture and computer security research communities because it stems from physical circuit-level interference effects that worsen with continued DRAM density scaling. As DRAM manufacturers primarily depend on density scaling to increase DRAM capacity, future DRAM chips will likely be more vulnerable to RowHammer than those of the past. Many RowHammer mitigation mechanisms have been proposed by both industry and academia, but it is unclear whether these mechanisms will remain viable solutions for future devices, as their overheads increase with DRAM’s vulnerability to RowHammer.In order to shed more light on how RowHammer affects modern and future devices at the circuit-level, we first present an experimental characterization of RowHammer on 1580 DRAM chips (408$\times$DDR3, 652$\times$DDR4, and 520$\times$LPDDR4) from 300 DRAM modules (60$\times$DDR3, 110$\times$DDR4, and 130$\times$LPDDR4) with RowHammer protection mechanisms disabled, spanning multiple different technology nodes from across each of the three major DRAM manufacturers. Our studies definitively show that newer DRAM chips are more vulnerable to RowHammer: as device feature size reduces, the number of activations needed to induce a RowHammer bit flip also reduces, to as few as 9.6 k (4.8k to two rows each) in the most vulnerable chip we tested.We evaluate five state-of-the-art RowHammer mitigation mechanisms using cycle-accurate simulation in the context of real data taken from our chips to study how the mitigation mechanisms scale with chip vulnerability. We find that existing mechanisms either are not scalable or suffer from prohibitively large performance overheads in projected future devices given our observed trends of RowHammer vulnerability. Thus, it is critical to research more effective solutions to RowHammer.
Year
DOI
Venue
2020
10.1109/ISCA45697.2020.00059
2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)
DocType
ISSN
ISBN
Conference
0884-7495
978-1-7281-4661-4
Citations 
PageRank 
References 
13
0.50
67
Authors
7
Name
Order
Citations
PageRank
Kim Jeremie S.1130.50
Minesh Patel22049.82
Abdullah Giray Yaglikci3432.51
Hasan Hassan435217.76
Azizi Roknoddin5130.50
Lois Orosa6725.27
Onur Mutlu79446357.40