Home
TECHNICAL PAPERS

Rowhammer Mitigation: In-DRAM Mechanism Scaling The Number of Refreshes With Activations (ETH Zurich)

popularity

A technical paper titled “REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations” was written by researchers at Computer Security Group (COMSEC), ETH Zurich and Zentel Japan. The paper will be presented at IEEE’s Symposium on Security and Privacy in May 2023.

“With REGA, we propose the first fully in-DRAM mitigation capable of protecting devices independently from their blast diameter. REGA scales gracefully, allowing it to protect devices with very low Rowhammer thresholds of 261 activations with negligible 3.7% performance overhead. This is the first time that such a low threshold has ever been considered. It is ~36 times lower than the minimum threshold reported,” states the ETH Zurich’s COMSEC summary.

Find the technical paper here and on Github. The paper will be presented at IEEE’s Symposium on Security and Privacy in May 2023.

Authors: Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi and Kaveh Razavi.

Related
Rowhammer: Recent Developments & Future Directions (ETH Zurich)
Memory-Based Cyberattacks Become More Complex, Difficult To Detect
Techniques are constantly changing, making memory protection an increasing challenge.
Quantifying Rowhammer Vulnerability For DRAM Security
New insight on Rowhammer attacks, including an analytical model of capacitive-coupling vulnerabilities in DRAMs.
Decreasing Refresh Latency Of Off-The-Shelf DRAM Chips
An Escalation Of Rowhammer To Rows Beyond Immediate Neighbors



Leave a Reply


(Note: This name will be displayed publicly)