论文标题
可扩展和安全的行 - 汇:内存系统中有效且安全的排锤缓解措施
Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems
论文作者
论文摘要
随着动态随机访问记忆(DRAM)量表,它们变得越来越容易受到行锤的影响。通过快速激活DRAM细胞的行(侵略者行),攻击者可以通过行锤中的间间干扰来利用邻近行(受害者行)的翻转位。最新的工作称为随机行-S-wap(RRS),提出了主动地将侵略者行与随机选择的行交换,然后侵略者行可能会导致行锤。 我们的论文观察到RR既不安全也不可扩展。我们首先提出了“剑圣攻击模式”,该模式在1天内打破了RR。 Juggernaut利用了这样一个事实,即RRS的缓解行动本身可以引起其他目标行激活,击败这种防御。其次,本文提出了一种新的防御安全行减压机制,避免了掉期(和Unswap)操作的其他激活,并防止剑圣。此外,本文通过攻击检测扩展了安全的行减速,以防止即将来临的攻击。尽管这提供了更好的安全性,但它还允许安全地降低掉期频率,从而实现可扩展和安全的行减量。与RRS设计相比,可扩展且安全的行塑料机构提供了多年的行锤保护,并提供3.3倍的存储开销。与1200的行锤阈值的非安全基线相比,它仅产生0.7%的放缓。
As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows), attackers can exploit inter-cell interference through Row Hammer to flip bits in neighboring rows (victim rows). A recent work, called Randomized Row-Swap (RRS), proposed proactively swapping aggressor rows with randomly selected rows before an aggressor row can cause Row Hammer. Our paper observes that RRS is neither secure nor scalable. We first propose the `Juggernaut attack pattern' that breaks RRS in under 1 day. Juggernaut exploits the fact that the mitigative action of RRS, a swap operation, can itself induce additional target row activations, defeating such a defense. Second, this paper proposes a new defense Secure Row-Swap mechanism that avoids the additional activations from swap (and unswap) operations and protects against Juggernaut. Furthermore, this paper extends Secure Row-Swap with attack detection to defend against even future attacks. While this provides better security, it also allows for securely reducing the frequency of swaps, thereby enabling Scalable and Secure Row-Swap. The Scalable and Secure Row-Swap mechanism provides years of Row Hammer protection with 3.3X lower storage overheads as compared to the RRS design. It incurs only a 0.7% slowdown as compared to a not-secure baseline for a Row Hammer threshold of 1200.