Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices (2206.09999v1)

Published 20 Jun 2022 in cs.AR and cs.CR

Abstract: RowHammer is a circuit-level DRAM vulnerability, where repeatedly activating and precharging a DRAM row, and thus alternating the voltage of a row's wordline between low and high voltage levels, can cause bit flips in physically nearby rows. Recent DRAM chips are more vulnerable to RowHammer: with technology node scaling, the minimum number of activate-precharge cycles to induce a RowHammer bit flip reduces and the RowHammer bit error rate increases. Therefore, it is critical to develop effective and scalable approaches to protect modern DRAM systems against RowHammer. To enable such solutions, it is essential to develop a deeper understanding of the RowHammer vulnerability of modern DRAM chips. However, even though the voltage toggling on a wordline is a key determinant of RowHammer vulnerability, no prior work experimentally demonstrates the effect of wordline voltage (VPP) on the RowHammer vulnerability. Our work closes this gap in understanding. This is the first work to experimentally demonstrate on 272 real DRAM chips that lowering VPP reduces a DRAM chip's RowHammer vulnerability. We show that lowering VPP 1) increases the number of activate-precharge cycles needed to induce a RowHammer bit flip by up to 85.8% with an average of 7.4% across all tested chips and 2) decreases the RowHammer bit error rate by up to 66.9% with an average of 15.2% across all tested chips. At the same time, reducing VPP marginally worsens a DRAM cell's access latency, charge restoration, and data retention time within the guardbands of system-level nominal timing parameters for 208 out of 272 tested chips. We conclude that reducing VPP is a promising strategy for reducing a DRAM chip's RowHammer vulnerability without requiring modifications to DRAM chips.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (10)
  1. A. Giray Yağlıkçı (36 papers)
  2. Haocong Luo (27 papers)
  3. Geraldo F. de Oliviera (1 paper)
  4. Ataberk Olgun (47 papers)
  5. Minesh Patel (25 papers)
  6. Jisung Park (30 papers)
  7. Hasan Hassan (35 papers)
  8. Jeremie S. Kim (31 papers)
  9. Lois Orosa (27 papers)
  10. Onur Mutlu (279 papers)
Citations (42)

Summary

Experimental Investigation of RowHammer Vulnerability Under Reduced Wordline Voltage

The paper "Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices" presents a comprehensive analysis of the RowHammer vulnerability in DRAM chips, concentrating specifically on the effects of reduced wordline voltage, VPPV_{PP}. Conducted on 272 DDR4 DRAM chips, this paper reveals how lowering VPPV_{PP} influences RowHammer characteristics, providing insights into the security and reliability of DRAM modules used in modern computing platforms.

Background and Context

DRAM systems have been increasingly susceptible to RowHammer attacks, a phenomenon where frequent activation of a row can cause bit flips in adjacent rows due to electrical interference. This vulnerability is a significant security issue as it allows for potential privileges escalation and data leakage without direct access to the targeted data rows. Recent trends suggest that RowHammer vulnerabilities intensify with advancing DRAM chip generations, necessitating the development of effective mitigation strategies.

Previous research has largely focused on mitigating RowHammer effects through improved circuit designs and operational protocols, but an understanding of how voltage manipulation can influence this vulnerability was lacking. This paper fills that gap, systematically evaluating the impact of reduced VPPV_{PP} on RowHammer sensitivity across different DRAM modules.

Methodology and Key Findings

  1. Experimental Setup: The paper utilized a modified version of SoftMC, a flexible DRAM testing platform, to conduct experiments at controlled temperatures and variable VPPV_{PP} levels. DRAM chips from different manufacturers were thoroughly surveyed to ensure the robustness and representativeness of results across various architectures and process technologies.
  2. RowHammer Metrics: Two critical metrics were used to gauge RowHammer vulnerability—Hammer Count First (HCfirstHC_{first}) and Bit Error Rate (BER). These metrics were evaluated under nominal voltage conditions and at reduced VPPV_{PP}, down to the minimum reliable operational voltage (VPPminV_{PPmin}).
  3. Impact on RowHammer Vulnerability: The reduction in VPPV_{PP} resulted in a significant decrease in RowHammer BER by an average of 15.2% across all tested chips, highlighting its potential as a mitigation strategy. Furthermore, HCfirstHC_{first} increased by 7.4%, suggesting fewer bit flips at lower voltage levels, thus reducing the effectiveness of RowHammer attacks.
  4. DRAM Operation Reliability: While reducing VPPV_{PP} provided clear benefits in terms of RowHammer vulnerability, its impact on standard DRAM operations—such as access latency and charge restoration—was carefully examined. Most chips continued to function reliably with adjustments within existing guardbands and through minor enhancements, such as increased row activation latency.

Implications and Future Directions

The findings imply that VPPV_{PP} reduction could be a promising avenue for RowHammer mitigation without necessitating significant alterations to chip designs. This approach complements existing software and hardware-level defense mechanisms, offering a low-overhead alternative that can be integrated seamlessly into current systems. Further studies might explore optimizing DRAM designs to accommodate lower VPPV_{PP} full-time or dynamically adjust voltage levels based on operational requirements and threat levels.

In addition, the paper provides a foundation for exploring temperature-voltage interactions in DRAM to develop holistic strategies for mitigating various vulnerabilities. Such research would be pivotal to ensuring data integrity and system reliability across diverse operational environments.

Conclusion

This experimental paper contributes meaningfully to DRAM security research by elucidating the role of wordline voltage in RowHammer vulnerability. By demonstrating how VPPV_{PP} variation affects both RowHammer susceptibility and DRAM operational reliability, it opens new pathways for safeguarding memory systems against progressively sophisticated attacks in the future. Researchers and engineers can leverage these insights to design DRAM modules that better balance performance, cost, and security in computation-intensive applications.

X Twitter Logo Streamline Icon: https://streamlinehq.com
Youtube Logo Streamline Icon: https://streamlinehq.com