Abstract
Row Hammer (RH) has been demonstrated as a security vulnerability in modern systems. Although commodity CPUs can handle RH-induced single-bit errors in DRAM through ECC, RH can still give rise to multi-bit uncorrectable errors (UEs) and crash the systems. Meanwhile, recent work has indicated that the DRAM cells vulnerable to RH are determined by manufacturing imperfections and resulting defects. Taking one step further from the recent work, we first conduct RH experiments on contemporary DRAM modules for 3 weeks. This demonstrates that RH-induced UEs occur only at specific DRAM addresses (RH-UE-vulnerable addresses) and the percentage of such addresses is small in these DRAM modules. Second, to protect the systems from RH-induced UEs, we propose two RH defense solutions: H- and S-TAROT (TArgeted ROw-Hammer Therapy). H-TAROT is a software-based solution running on the host CPU. It obtains RH-UE-vulnerable addresses during the system boot and then periodically accesses such addresses before UEs may occur. Since it accesses only a small percentage of addresses, it does not incur a notable performance penalty for throughput applications (e.g., a 1.5% increase in execution time of the SPECrate 2017 benchmark suite running on a system even with 128GB of DRAM). Yet, it imposes a significant performance penalty on latency-sensitive applications (e.g., a 28.2% increase in tail latency of Redis). To minimize the performance penalty, for a system with a SmartNIC (SNIC), S-TAROT offloads H-TAROT from the host CPU to the SNIC CPU. Our experiment shows that S-TAROT increases the execution time and tail latency of the SPECrate 2017 benchmark suite and Redis by only 0.1% and 1.0%, respectively.
Original language | English |
---|---|
Title of host publication | Fall Cycle |
Publisher | Association for Computing Machinery |
Pages | 981-998 |
Number of pages | 18 |
ISBN (Electronic) | 9798400703867 |
DOIs | |
Publication status | Published - 2024 Apr 27 |
Event | 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2024 - San Diego, United States Duration: 2024 Apr 27 → 2024 May 1 |
Publication series
Name | International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS |
---|---|
Volume | 3 |
Conference
Conference | 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2024 |
---|---|
Country/Territory | United States |
City | San Diego |
Period | 24/4/27 → 24/5/1 |
Bibliographical note
Publisher Copyright:© 2024 Copyright held by the owner/author(s).
All Science Journal Classification (ASJC) codes
- Software
- Information Systems
- Hardware and Architecture