An Experimental Analysis of RowHammer in HBM2 DRAM Chips

RowHammer (RH) is a significant and worsening security, safety, and reliability issue of modern DRAM chips that can be exploited to break memory isolation. Therefore, it is important to understand real DRAM chips' RH characteristics. Unfortunately, no prior work extensively studies the RH vulne...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Olgun, Ataberk, Osseiran, Majd, Ya{ğ}lık{c}ı, Abdullah Giray, Tuğrul, Yahya Can, Luo, Haocong, Rhyner, Steve, Salami, Behzad, Luna, Juan Gomez, Mutlu, Onur
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Olgun, Ataberk
Osseiran, Majd
Ya{ğ}lık{c}ı, Abdullah Giray
Tuğrul, Yahya Can
Luo, Haocong
Rhyner, Steve
Salami, Behzad
Luna, Juan Gomez
Mutlu, Onur
description RowHammer (RH) is a significant and worsening security, safety, and reliability issue of modern DRAM chips that can be exploited to break memory isolation. Therefore, it is important to understand real DRAM chips' RH characteristics. Unfortunately, no prior work extensively studies the RH vulnerability of modern 3D-stacked high-bandwidth memory (HBM) chips, which are commonly used in modern GPUs. In this work, we experimentally characterize the RH vulnerability of a real HBM2 DRAM chip. We show that 1) different 3D-stacked channels of HBM2 memory exhibit significantly different levels of RH vulnerability (up to 79% difference in bit error rate), 2) the DRAM rows at the end of a DRAM bank (rows with the highest addresses) exhibit significantly fewer RH bitflips than other rows, and 3) a modern HBM2 DRAM chip implements undisclosed RH defenses that are triggered by periodic refresh operations. We describe the implications of our observations on future RH attacks and defenses and discuss future work for understanding RH in 3D-stacked memories.
doi_str_mv 10.48550/arxiv.2305.17918
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2305_17918</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2305_17918</sourcerecordid><originalsourceid>FETCH-LOGICAL-a678-39fdf994a755643df58c3dffe1a58f99d4568a075e9a46f87ce9e524d41b13573</originalsourceid><addsrcrecordid>eNotj8sOgjAURLtxYdQPcGV_AKS0l7ZLxAcmGBPjnlyljU0ACRgffy8-NjOLSSbnEDJlgS8UQDDH9unufsgD8JnUTA2Jimu6ejamdZWpb1jSuMby1bmOXi09XB8pVpVpqatputiFdHmIdzS5uKYbk4HFsjOTf4_Icb06JqmX7TfbJM48jKTyuLaF1VqgBIgELyyoc5_WMATVD4WASGEgwWgUkVXybLSBUBSCnRgHyUdk9rv9oudNz4ntK_8o5F8F_gaZVD8Y</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An Experimental Analysis of RowHammer in HBM2 DRAM Chips</title><source>arXiv.org</source><creator>Olgun, Ataberk ; Osseiran, Majd ; Ya{ğ}lık{c}ı, Abdullah Giray ; Tuğrul, Yahya Can ; Luo, Haocong ; Rhyner, Steve ; Salami, Behzad ; Luna, Juan Gomez ; Mutlu, Onur</creator><creatorcontrib>Olgun, Ataberk ; Osseiran, Majd ; Ya{ğ}lık{c}ı, Abdullah Giray ; Tuğrul, Yahya Can ; Luo, Haocong ; Rhyner, Steve ; Salami, Behzad ; Luna, Juan Gomez ; Mutlu, Onur</creatorcontrib><description>RowHammer (RH) is a significant and worsening security, safety, and reliability issue of modern DRAM chips that can be exploited to break memory isolation. Therefore, it is important to understand real DRAM chips' RH characteristics. Unfortunately, no prior work extensively studies the RH vulnerability of modern 3D-stacked high-bandwidth memory (HBM) chips, which are commonly used in modern GPUs. In this work, we experimentally characterize the RH vulnerability of a real HBM2 DRAM chip. We show that 1) different 3D-stacked channels of HBM2 memory exhibit significantly different levels of RH vulnerability (up to 79% difference in bit error rate), 2) the DRAM rows at the end of a DRAM bank (rows with the highest addresses) exhibit significantly fewer RH bitflips than other rows, and 3) a modern HBM2 DRAM chip implements undisclosed RH defenses that are triggered by periodic refresh operations. We describe the implications of our observations on future RH attacks and defenses and discuss future work for understanding RH in 3D-stacked memories.</description><identifier>DOI: 10.48550/arxiv.2305.17918</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Hardware Architecture</subject><creationdate>2023-05</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2305.17918$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2305.17918$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Olgun, Ataberk</creatorcontrib><creatorcontrib>Osseiran, Majd</creatorcontrib><creatorcontrib>Ya{ğ}lık{c}ı, Abdullah Giray</creatorcontrib><creatorcontrib>Tuğrul, Yahya Can</creatorcontrib><creatorcontrib>Luo, Haocong</creatorcontrib><creatorcontrib>Rhyner, Steve</creatorcontrib><creatorcontrib>Salami, Behzad</creatorcontrib><creatorcontrib>Luna, Juan Gomez</creatorcontrib><creatorcontrib>Mutlu, Onur</creatorcontrib><title>An Experimental Analysis of RowHammer in HBM2 DRAM Chips</title><description>RowHammer (RH) is a significant and worsening security, safety, and reliability issue of modern DRAM chips that can be exploited to break memory isolation. Therefore, it is important to understand real DRAM chips' RH characteristics. Unfortunately, no prior work extensively studies the RH vulnerability of modern 3D-stacked high-bandwidth memory (HBM) chips, which are commonly used in modern GPUs. In this work, we experimentally characterize the RH vulnerability of a real HBM2 DRAM chip. We show that 1) different 3D-stacked channels of HBM2 memory exhibit significantly different levels of RH vulnerability (up to 79% difference in bit error rate), 2) the DRAM rows at the end of a DRAM bank (rows with the highest addresses) exhibit significantly fewer RH bitflips than other rows, and 3) a modern HBM2 DRAM chip implements undisclosed RH defenses that are triggered by periodic refresh operations. We describe the implications of our observations on future RH attacks and defenses and discuss future work for understanding RH in 3D-stacked memories.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Hardware Architecture</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8sOgjAURLtxYdQPcGV_AKS0l7ZLxAcmGBPjnlyljU0ACRgffy8-NjOLSSbnEDJlgS8UQDDH9unufsgD8JnUTA2Jimu6ejamdZWpb1jSuMby1bmOXi09XB8pVpVpqatputiFdHmIdzS5uKYbk4HFsjOTf4_Icb06JqmX7TfbJM48jKTyuLaF1VqgBIgELyyoc5_WMATVD4WASGEgwWgUkVXybLSBUBSCnRgHyUdk9rv9oudNz4ntK_8o5F8F_gaZVD8Y</recordid><startdate>20230529</startdate><enddate>20230529</enddate><creator>Olgun, Ataberk</creator><creator>Osseiran, Majd</creator><creator>Ya{ğ}lık{c}ı, Abdullah Giray</creator><creator>Tuğrul, Yahya Can</creator><creator>Luo, Haocong</creator><creator>Rhyner, Steve</creator><creator>Salami, Behzad</creator><creator>Luna, Juan Gomez</creator><creator>Mutlu, Onur</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20230529</creationdate><title>An Experimental Analysis of RowHammer in HBM2 DRAM Chips</title><author>Olgun, Ataberk ; Osseiran, Majd ; Ya{ğ}lık{c}ı, Abdullah Giray ; Tuğrul, Yahya Can ; Luo, Haocong ; Rhyner, Steve ; Salami, Behzad ; Luna, Juan Gomez ; Mutlu, Onur</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a678-39fdf994a755643df58c3dffe1a58f99d4568a075e9a46f87ce9e524d41b13573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Hardware Architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Olgun, Ataberk</creatorcontrib><creatorcontrib>Osseiran, Majd</creatorcontrib><creatorcontrib>Ya{ğ}lık{c}ı, Abdullah Giray</creatorcontrib><creatorcontrib>Tuğrul, Yahya Can</creatorcontrib><creatorcontrib>Luo, Haocong</creatorcontrib><creatorcontrib>Rhyner, Steve</creatorcontrib><creatorcontrib>Salami, Behzad</creatorcontrib><creatorcontrib>Luna, Juan Gomez</creatorcontrib><creatorcontrib>Mutlu, Onur</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Olgun, Ataberk</au><au>Osseiran, Majd</au><au>Ya{ğ}lık{c}ı, Abdullah Giray</au><au>Tuğrul, Yahya Can</au><au>Luo, Haocong</au><au>Rhyner, Steve</au><au>Salami, Behzad</au><au>Luna, Juan Gomez</au><au>Mutlu, Onur</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Experimental Analysis of RowHammer in HBM2 DRAM Chips</atitle><date>2023-05-29</date><risdate>2023</risdate><abstract>RowHammer (RH) is a significant and worsening security, safety, and reliability issue of modern DRAM chips that can be exploited to break memory isolation. Therefore, it is important to understand real DRAM chips' RH characteristics. Unfortunately, no prior work extensively studies the RH vulnerability of modern 3D-stacked high-bandwidth memory (HBM) chips, which are commonly used in modern GPUs. In this work, we experimentally characterize the RH vulnerability of a real HBM2 DRAM chip. We show that 1) different 3D-stacked channels of HBM2 memory exhibit significantly different levels of RH vulnerability (up to 79% difference in bit error rate), 2) the DRAM rows at the end of a DRAM bank (rows with the highest addresses) exhibit significantly fewer RH bitflips than other rows, and 3) a modern HBM2 DRAM chip implements undisclosed RH defenses that are triggered by periodic refresh operations. We describe the implications of our observations on future RH attacks and defenses and discuss future work for understanding RH in 3D-stacked memories.</abstract><doi>10.48550/arxiv.2305.17918</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2305.17918
ispartof
issn
language eng
recordid cdi_arxiv_primary_2305_17918
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Hardware Architecture
title An Experimental Analysis of RowHammer in HBM2 DRAM Chips
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T20%3A53%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Experimental%20Analysis%20of%20RowHammer%20in%20HBM2%20DRAM%20Chips&rft.au=Olgun,%20Ataberk&rft.date=2023-05-29&rft_id=info:doi/10.48550/arxiv.2305.17918&rft_dat=%3Carxiv_GOX%3E2305_17918%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true