Article Dans Une Revue
IEEE Computer Architecture Letters
Année : 2024
Résumé
Modern computer memories have shown to have reliability issues. The main memory is the target of a security threat called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Numerous countermeasures have been proposed, some of the most efficient ones relying on row access counters, with different techniques to reduce the impact on performance, energy consumption and silicon area. In these proposals, the number of counters is calculated using the maximum number of row activations that can be issued to the protected bank. As reducing the number of counters results in lower silicon area and energy overheads, this can have a direct impact on the production and usage costs. In this work, we demonstrate that two of the most efficient countermeasures can have their silicon area overhead reduced by approximately 50% without impacting the protection level by changing their counting granularity.
Domaines
Architectures Matérielles [cs.AR]Origine | Fichiers produits par l'(les) auteur(s) |
---|
Florent Bruguier : Connectez-vous pour contacter le contributeur
https://hal-lirmm.ccsd.cnrs.fr/lirmm-04420368
Soumis le : vendredi 26 janvier 2024-17:09:10
Dernière modification le : jeudi 7 novembre 2024-16:14:03
Dates et versions
- HAL Id : lirmm-04420368 , version 1
- DOI : 10.1109/LCA.2023.3328824
Citer
Loïc France, Florent Bruguier, David Novo, Maria Mushtaq, Pascal Benoit. Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations. IEEE Computer Architecture Letters, 2024, IEEE Computer Architecture Letters, 23 (1), pp.61-64. ⟨10.1109/LCA.2023.3328824⟩. ⟨lirmm-04420368⟩
Collections
285
Consultations
82
Téléchargements