Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

TRRespass: Exploiting the Many Sides of Target Row Refresh (2004.01807v1)

Published 3 Apr 2020 in cs.CR

Abstract: After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what was meant to be the definitive hardware solution against the RowHammer problem: Target Row Refresh (TRR). A common belief among practitioners is that, for the latest generation of DDR4 systems that are protected by TRR, RowHammer is no longer an issue in practice. However, in reality, very little is known about TRR. In this paper, we demystify the inner workings of TRR and debunk its security guarantees. We show that what is advertised as a single mitigation mechanism is actually a series of different solutions coalesced under the umbrella term TRR. We inspect and disclose, via a deep analysis, different existing TRR solutions and demonstrate that modern implementations operate entirely inside DRAM chips. Despite the difficulties of analyzing in-DRAM mitigations, we describe novel techniques for gaining insights into the operation of these mitigation mechanisms. These insights allow us to build TRRespass, a scalable black-box RowHammer fuzzer. TRRespass shows that even the latest generation DDR4 chips with in-DRAM TRR, immune to all known RowHammer attacks, are often still vulnerable to new TRR-aware variants of RowHammer that we develop. In particular, TRRespass finds that, on modern DDR4 modules, RowHammer is still possible when many aggressor rows are used (as many as 19 in some cases), with a method we generally refer to as Many-sided RowHammer. Overall, our analysis shows that 13 out of the 42 modules from all three major DRAM vendors are vulnerable to our TRR-aware RowHammer access patterns, and thus one can still mount existing state-of-the-art RowHammer attacks. In addition to DDR4, we also experiment with LPDDR4 chips and show that they are susceptible to RowHammer bit flips too. Our results provide concrete evidence that the pursuit of better RowHammer mitigations must continue.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (8)
  1. Pietro Frigo (2 papers)
  2. Emanuele Vannacci (1 paper)
  3. Hasan Hassan (35 papers)
  4. Victor van der Veen (4 papers)
  5. Onur Mutlu (279 papers)
  6. Cristiano Giuffrida (8 papers)
  7. Herbert Bos (4 papers)
  8. Kaveh Razavi (6 papers)
Citations (190)

Summary

  • The paper demonstrates that TRR is not a uniform defense and remains vulnerable to sophisticated RowHammer attacks.
  • It employs custom hardware experiments on 42 DDR4 modules, revealing vulnerabilities with as few as 45,000 row activations.
  • The TRRespass tool uses a black-box fuzzing method to bypass TRR defenses, urging greater transparency and improved DRAM security.

Overview of TRRespass: Exploiting the Many Sides of Target Row Refresh

The paper "TRRespass: Exploiting the Many Sides of Target Row Refresh" addresses the prevalent assumption among practitioners that modern DDR4 systems, equipped with Target Row Refresh (TRR) technology, are immune to RowHammer attacks. However, through a comprehensive analysis and experimentation with 42 DDR4 memory modules, the paper demonstrates that this assumption is misplaced and that RowHammer vulnerabilities persist even in the newest hardware.

TRR Mechanisms and Research Hypotheses

The paper begins by debunking the notion of TRR as a single unified hardware defense. Instead, it identifies TRR as a suite of disparate solutions that are variably implemented across different DRAM vendors and devices. Two crucial components of the TRR architecture are defined: the Sampler, which is responsible for tracking rows that have been repeatedly activated, and the Inhibitor, which aims to neutralize RowHammer impacts by refreshing victim rows selectively. The paper posits that the Sampler and Inhibitor have inherent limitations, including a finite capacity to track aggressor rows and limited efficiency in executing target-refresh operations during standard refresh intervals. These hypotheses guide the paper's subsequent empirical investigations.

Experimental Methodology and Results

Utilizing custom-built hardware tools, specifically an extended version of the SoftMC framework to issue precise DRAM commands, the authors systematically dismantle the defenses claimed by TRR implementations. They reveal vulnerability through the use of Many-sided RowHammer, which employs numerous aggressor rows in concert, thus overwhelming the Sampler’s capacity and bypassing TRR's protective mechanisms.

The paper exposes that RowHammer vulnerabilities can still be triggered with as few as 45,000 row activations in the DDR4 modules examined. Notably, 13 of the 42 modules tested from major DRAM vendors such as Samsung, Micron, and Hynix were susceptible to TRR-aware RowHammer approaches. The findings are notable; even with presumed defenses, modules exhibit significant numbers of bit flips, underscoring a failure in TRR-integrated hardware's advertised security.

TRRespass Tool and Implications

A key contribution of the paper is the introduction of TRRespass, a black-box RowHammer fuzzer designed to expose weaknesses in TRR-protected systems without prior knowledge of the specific TRR implementations in play. TRRespass proves effective in identifying novel TRR-aware access patterns that lead to RowHammer bit flips, highlighting the inadequacy of current hardware mitigations. Additionally, the success of TRRespass across different devices, including those utilizing LPDDR4(X), suggests a widespread risk transcending typical enterprise and consumer applications.

The research elucidates that DRAM vendors' reliance on secrecy regarding TRR implementation has left consumers vulnerable, particularly in systems where hardware replacement is not feasible. The exploration suggests an urgent need for more robust mitigation strategies that are not solely dependent on in-DRAM protections that can be easily neutralized.

Future Directions

The paper advocates for continued research into RowHammer mitigations, not just as a preventative measure but as an ongoing strategy to enhance DRAM security landscapes. Furthermore, it encourages open discourse and detailed documentation from DRAM vendors regarding their security mechanisms, inviting collaboration and fostering a security-oriented design paradigm for future DRAM technologies.

In summary, the paper significantly contributes to the understanding of TRR's limitations and the ongoing vulnerabilities posed by RowHammer in contemporary DRAM systems. By providing a meticulous examination of existing safeguards and proposing advanced testing methodologies, it paves the way for future research and innovation in memory security.