Assessing the Potential of Escalating RowHammer Attack Distance to Bypass-Counter-Based Defenses

Ranyang Zhou, Jacqueline Liu, Sabbir Ahmed, Nakul Kochar, Adnan Siraj Rakin, Shaahin Angizi

Research output: Contribution to journalArticlepeer-review

Abstract

This brief studies the impact of escalating DRAM RowHammer (RH) attack distance to potentially bypass well-developed counter-based defenses leveraging a multisided fault injection mechanism. By conducting systematic experimentation on 128 commercial DDR4 products, our results challenge recent research findings, showing that cells positioned at a greater physical distance from the target rows do not significantly affect performance across chips sourced from leading DRAM manufacturers. This implies such RH models are unable to reliably bypass the latest counter-based defense mechanisms. We conduct an extensive attack design space exploration and compare the performance efficiency between this mechanism and the well-known double-sided attack.

Original languageEnglish (US)
Pages (from-to)1609-1613
Number of pages5
JournalIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Volume44
Issue number4
DOIs
StatePublished - 2025

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering

Keywords

  • Attack distance
  • DRAM
  • RowHammer (RH) attack

Fingerprint

Dive into the research topics of 'Assessing the Potential of Escalating RowHammer Attack Distance to Bypass-Counter-Based Defenses'. Together they form a unique fingerprint.

Cite this