Memory-side cache-based rowhammer protection scheme메모리 측 캐시 기반 로우해머 보호 방안

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 1
  • Download : 0
The continuous advancement of DRAM technology has significantly increased memory capacity and performance, but it has also introduced challenges related to reliability. The Rowhammer threat has been demonstrated to have severe implications, including system crashes, and elevation of attacker process privileges. The increasing vulnerability of newer DRAM generations raises the seriousness of the Rowhammer threat even further. This study introduces an innovative memory-side cache-based mitigation against Rowhammer at-tacks that is uncontrolled by the CPU and is applicable to any DDR-based memory systems. We explore the design space of creating an entirely cache-based mitigation and, also, analyze the possibility of combining the cache with in-DRAM Rowhammer mitigations. We show that, although cache-only Rowhammer prevention has no performance overhead compared to the prior works, it has a significant hardware overhead for low Rowhammer threshold values, diminishing its attractiveness. However, the combination of the memory-side cache and Mithril, a prior work, is demonstrated to be effective in both reducing the overall hardware overhead of the cache and reducing the performance degradation of Mithril from 7.3% to 3% at the Rowhammer threshold of 256.
Advisors
김동준researcher
Description
한국과학기술원 :전기및전자공학부,
Publisher
한국과학기술원
Issue Date
2024
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2024.2,[iv, 26 p. :]

Keywords

하드웨어 보안▼a로해머▼a컴퓨터 아키텍처▼aDRAM▼a캐시; Hardware Security▼aRowhammer▼aComputer architecture▼aDRAM▼aCache

URI
http://hdl.handle.net/10203/321594
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=1097166&flag=dissertation
Appears in Collection
EE-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0