277 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author정기석-
dc.date.accessioned2022-11-10T01:51:32Z-
dc.date.available2022-11-10T01:51:32Z-
dc.date.issued2019-11-
dc.identifier.citation2019 IEEE 4th International Conference on Technology, Informatics, Management, Engineering & Environment (TIME-E), page. 37-42en_US
dc.identifier.urihttps://ieeexplore.ieee.org/document/9353293en_US
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/176574-
dc.description.abstractContinuous scaling-down of the DRAM manufacturing process technology has achieved a dense chip capacity with a low cost-per-bit. On the other hand, it has introduced a new reliability problem called row-hammering, in which, in case that a certain row is activated too frequently, one or more bits in the adjacent rows are unintentionally corrupted. It is crucial to address row-hammering errors because they not only can be exploited by a malicious attack for modern computing systems but also may occur in general applications stored in a highly scaled-down DRAM. Even if several methods have been proposed to resolve row-hammering, existing solutions have limited capability to prevent row-hammering from occurring. Hence, a more robust solution for row-hammering is necessary. In this paper, we propose a novel row-hammering mitigation mechanism, called Adaptive-probabilistic Additional Row Refresh (AARR). The main observation exploited by the proposed method is that each memory access does not have an equal degree of threat to cause row-hammering: accessing a row that has been frequently activated is much vulnerable to row-hammering rather than a barely activated row. In AARR, a small table and a few logic blocks are added to keep track of the threat level that causes row-hammering. Then, one of the adjacent rows of an accessed row is refreshed with an adaptive probability that corresponds to the threat level of that memory access. Our evaluation results show that the proposed method renders the most reliable protection against row-hammering with the lowest overhead on performance and energy compared to two well-known existing solutions.en_US
dc.description.sponsorshipThis research was funded by the Technology Innovation Program MOTIE (No. 10076583), the Competency Development Program for Industry Specialists MOTIE (No. 0001883), and IC Design Education Center (IDEC), Korea.en_US
dc.languageenen_US
dc.publisherIEEEen_US
dc.subjectDRAM; row-hammering; probability-based; aggressor row; victim row; reliability; securityen_US
dc.titleMitigating Row-hammering by Adapting the Probability of Additional Row Refreshen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TIME-E47986.2019.9353293en_US
dc.relation.page0-0-
dc.contributor.googleauthorWoo, Jeonghyun-
dc.contributor.googleauthorChung, Ki-Seok-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentSCHOOL OF ELECTRONIC ENGINEERING-
dc.identifier.pidkchung-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > ELECTRONIC ENGINEERING(융합전자공학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE