Aggressive memory density scaling causes modern DRAM devices to suffer from RowHammer, a phenomenon where rapidly activating a DRAM row can cause bit-flips in physically-nearby rows. Recent studies demonstrate that modern DRAM chips, including chips previously marketed as RowHammer-safe, are even more vulnerable to RowHammer than older chips. Many works show that attackers can exploit RowHammer bit-flips to reliably mount system-level attacks to escalate privilege and leak private data. Therefore, it is critical to ensure RowHammer-safe operation on all DRAM-based systems. Unfortunately, state-of-the-art RowHammer mitigation mechanisms face two major challenges. First, they incur increasingly higher performance and/or area overheads when applied to more vulnerable DRAM chips. Second, they require either proprietary information about or modifications to the DRAM chip design. In this paper, we show that it is possible to efficiently and scalably prevent RowHammer bit-flips without knowledge of or modification to DRAM internals. We introduce BlockHammer, a low-cost, effective, and easy-to-adopt RowHammer mitigation mechanism that overcomes the two key challenges by selectively throttling memory accesses that could otherwise cause RowHammer bit-flips. The key idea of BlockHammer is to (1) track row activation rates using area-efficient Bloom filters and (2) use the tracking data to ensure that no row is ever activated rapidly enough to induce RowHammer bit-flips. By doing so, BlockHammer (1) makes it impossible for a RowHammer bit-flip to occur and (2) greatly reduces a RowHammer attack's impact on the performance of co-running benign applications. Compared to state-of-the-art RowHammer mitigation mechanisms, BlockHammer provides competitive performance and energy when the system is not under a RowHammer attack and significantly better performance and energy when the system is under attack.
翻译:缩略式记忆密度缩放导致现代 DRAM 设备受到 Row Hammmer 的困扰, 这种现象是快速激活 DRAM 的行可能会在近距离的行内造成点翻。 最近的研究显示, 现代 DRAM 芯片, 包括以前作为Row Hammer- safe 销售的芯片, 比旧芯片更容易受到Row Hammer 的伤害。 许多作品显示, 攻击者可以利用Row Hammer 点翻版来可靠地启动系统攻击, 以提升特权并泄露私人数据。 因此, 必须确保RowHammer 在所有基于 DRA 的系统上进行安全操作。 不幸的是, 最先进的Row Hammer 减缓机制可能会面临两大重大挑战。 首先, 当将低成本、有效且容易的 Rowm- harmmer 减缓机制引入Breal-ral- developmental