中文 English
Home
TECHNICAL PAPERS

An Escalation of Rowhammer To Rows Beyond Immediate Neighbors

popularity

Researchers at Graz University of Technology, Lamarr Security Research, Google, AWS, and Rivos presented this new technical paper titled “Half-Double: Hammering From the Next Row Over” at the USENIX Security Symposium in Boston in August 2022.

Abstract:
“Rowhammer is a vulnerability in modern DRAM where repeated accesses to one row (the aggressor) give off electrical disturbance whose cumulative effect flips the bits in an adjacent row (the victim). Consequently, Rowhammer defenses presuppose the adjacency of aggressor-victim pairs, including those in LPDDR4 and DDR4, most notably TRR.

In this paper, we present Half-Double, an escalation of Rowhammer to rows beyond immediate neighbors. Using Half-Double, we induce errors in a victim by combining many accesses to a distance-2 row with just a few to a distance-1 row. Our experiments show that the cumulative effect of these leads to a sufficient electrical disturbance in the victim row, inducing bit flips. We demonstrate the practical relevance of Half-Double in a proof-of-concept attack on a fully up-to-date system. We use side channels, a new technique called BlindHammering, a new spraying technique, and a Spectre attack in our end-to-end Half-Double Attack. On recent Chromebooks with ECC- and TRR-protected LPDDR4x memory, the attack takes less than 45 minutes on average.”

Find the technical paper here.

Authors:
Andreas Kogler, Graz University of Technology; Jonas Juffinger, Graz University of Technology and Lamarr Security Research; Salman Qazi and Yoongu Kim, Google; Moritz Lipp, Amazon Web Services; Nicolas Boichat, Google; Eric Shiu, Rivos; Mattias Nissler, Google; Daniel Gruss, Graz University of Technology.

Related Reading
Is There A Practical Test For Rowhammer Vulnerability?
New approaches surface for persistent DRAM issue.
DRAM’s Persistent Threat To Chip Security
Rowhammer attack on memory could create significant issues for systems; possible solution emerges.
Quantifying Rowhammer Vulnerability For DRAM Security
New insight on Rowhammer attacks, including an analytical model of capacitive-coupling vulnerabilities in DRAMs.
A Case For Transparent Reliability In DRAM Systems
Researchers study four ways that system designers can adapt commodity DRAM chips to system-specific design goals.
DRAM Thermal Issues Reach Crisis Point
Increased transistor density and utilization are creating memory performance issues.



Leave a Reply


(Note: This name will be displayed publicly)