Reinforce Memory Error Protection by Breaking DRAM Disturbance Correlation Within ECC Words

Row-hammering attack is increasingly a concern to computer security and reliability, particularly for computer servers using chipkill correct memories, which are vulnerable to row-hammering attack because of disturbance correlation within ECC words. Probabilistic Adjacent Row Activation (PARA) can effectively lower the probability of successful row-hammering attack, but its strength can be significantly weakened by simultaneous attacks on many rows. This paper presents a novel hardware design to reinforce the chipkill correct memory by breaking the disturbance correlation within individual ECC words. It uses an XOR-based, device-specific row remapping such that a single PARA breach can only disturb any ECC word on at most one memory device. A row-hammering attack has to breach the PARA defense twice to cause uncorrectable or undetectable errors, which is much more challenging than before. A case of evaluation shows that the solution increases the memory MTTF from 0.144 to over 300,000 years. The design incurs negligible performance and energy overheads.

[1]  Yanick Fratantonio,et al.  Drammer: Deterministic Rowhammer Attacks on Mobile Platforms , 2016, CCS.

[2]  Chris Fallin,et al.  Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).

[3]  David Locklear CHIPKILL CORRECT MEMORY ARCHITECTURE , 2000 .

[4]  Eduardo Pinheiro,et al.  DRAM errors in the wild: a large-scale field study , 2009, SIGMETRICS '09.

[5]  Zhao Zhang,et al.  Detect DRAM Disturbance Error by Using Disturbance Bin Counters , 2019, IEEE Computer Architecture Letters.

[6]  Rami G. Melhem,et al.  Counter-Based Tree Structure for Row Hammering Mitigation in DRAM , 2017, IEEE Computer Architecture Letters.

[7]  Bruce Jacob,et al.  Memory Systems: Cache, DRAM, Disk , 2007 .

[8]  Sukhan Lee,et al.  TWiCe: Time Window Counter Based Row Refresh to Prevent Row-Hammering , 2018, IEEE Computer Architecture Letters.

[9]  Todd M. Austin,et al.  When good protections go bad: Exploiting anti-DoS measures to accelerate rowhammer attacks , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[10]  Dae-Hyun Kim,et al.  Architectural Support for Mitigating Row Hammering in DRAM Memories , 2015, IEEE Computer Architecture Letters.

[11]  Reetuparna Das,et al.  ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks , 2016, ASPLOS.

[12]  Sungjoo Yoo,et al.  Making DRAM stronger against row hammering , 2017, 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).

[13]  Timothy J. Dell,et al.  A white paper on the benefits of chipkill-correct ecc for pc server main memory , 1997 .

[14]  Tieh-Chiang Wu,et al.  Suppression of Row Hammer Effect by Doping Profile Modification in Saddle-Fin Array Devices for Sub-30-nm DRAM Technology , 2016, IEEE Transactions on Device and Materials Reliability.