Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/12489
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCanpolat, Oguzhan-
dc.contributor.authorYaglikci, A. Giray-
dc.contributor.authorOliveira, Geraldo F.-
dc.contributor.authorOlgun, Ataberk-
dc.contributor.authorBostanci, Nisa-
dc.contributor.authorYuksel, Ismail Emir-
dc.contributor.authorMutlu, Onur-
dc.date.accessioned2025-05-10T19:34:55Z-
dc.date.available2025-05-10T19:34:55Z-
dc.date.issued2025-
dc.identifier.isbn9798331506483-
dc.identifier.isbn9798331506476-
dc.identifier.issn1530-0897-
dc.identifier.urihttps://doi.org/10.1109/HPCA61900.2025.00071-
dc.descriptionErgin, Oguz/0000-0003-2701-3787en_US
dc.description.abstractRead disturbance in modern DRAM is an important robustness (security, safety, and reliability) problem, where repeatedly accessing (hammering) a row of DRAM cells (DRAM row) induces bitflips in other physically nearby DRAM rows. Shrinking technology node size exacerbates DRAM read disturbance over generations. To help mitigate read disturbance, the latest DDR5 specifications (as of April 2024) introduced a new RowHammer mitigation framework, called Per Row Activation Counting (PRAC). PRAC 1) enables the DRAM chip to accurately track row activations by allocating an activation counter per row and 2) provides the DRAM chip with the necessary time window to perform RowHammer-preventive refreshes by introducing a new back-off signal. Unfortunately, no prior work rigorously studies PRAC's security guarantees and overheads. In this paper, we 1) present the first rigorous security, performance, energy, and cost analyses of PRAC and 2) propose Chronus, a new mechanism that addresses PRAC's two major weaknesses. Our analysis shows that PRAC's system performance overhead on benign applications is non-negligible for modern DRAM chips and prohibitively large for future DRAM chips that are more vulnerable to read disturbance. We identify two weaknesses of PRAC that cause these overheads. First, PRAC increases critical DRAM access latency parameters due to the additional time required to increment activation counters. Second, PRAC performs a constant number of preventive refreshes at a time, making it vulnerable to an adversarial access pattern, known as the wave attack, and consequently requiring it to be configured for significantly smaller activation thresholds. To address PRAC's two weaknesses, we propose a new on-DRAM-die RowHammer mitigation mechanism, Chronus. Chronus 1) updates row activation counters concurrently while serving accesses by separating counters from the data and 2) prevents the wave attack by dynamically controlling the number of preventive refreshes performed. Our performance analysis shows that Chronus's system performance overhead is near-zero for modern DRAM chips and very low for future DRAM chips. Chronus outperforms three variants of PRAC and three other state-of-the-art read disturbance solutions. We discuss Chronus's and PRAC's implications for future systems and foreshadow future research directions. To aid future research, we open-source our Chronus implementation at https://github.com/CMU- SAFARI/Chronus.en_US
dc.description.sponsorshipHuawei; Intel; VMware; Google Security and Privacy Research Award; Microsoft Swiss Joint Research Center; ETH Future Computing Laboratory (EFCL); Google; Microsoften_US
dc.description.sponsorshipThis paper is a significantly extended version of an earlier work presented at DRAMSec 2024 [175]. We thank the anonymous reviewers of DRAMSec 2024 and HPCA 2025 (both main submission and artifact evaluation) for the encouraging feedback. We thank the SAFARI Research Group members for valuable feedback and the stimulating scientific and intellectual environment. We acknowledge the generous gift funding provided by our industrial partners (especially Google, Huawei, Intel, Microsoft, VMware), which has been instrumental in enabling the research we have been conducting on read disturbance in DRAM since 2011 [222]. This work was also in part supported by a Google Security and Privacy Research Award, the Microsoft Swiss Joint Research Center, and the ETH Future Computing Laboratory (EFCL).en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Socen_US
dc.relation.ispartof2025 International Symposium on High Performance Computer Architecture-HPCA-Annual -- MAR 01-05, 2025 -- Las Vegas, NVen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.titleChronus: Understanding and Securing the Cutting-Edge Industry Solutions to Dram Read Disturbanceen_US
dc.typeConference Objecten_US
dc.relation.ispartofseriesInternational Symposium on High-Performance Computer Architecture-Proceedings-
dc.departmentTOBB University of Economics and Technologyen_US
dc.identifier.startpage887en_US
dc.identifier.endpage905en_US
dc.authoridErgin, Oguz/0000-0003-2701-3787-
dc.identifier.wosWOS:001494383800063-
dc.identifier.scopus2-s2.0-105003417835-
dc.identifier.doi10.1109/HPCA61900.2025.00071-
dc.authorwosidYüksel, İsmail Emir/Grj-1043-2022-
dc.authorwosidErgin, Oguz/E-5717-2010-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
dc.description.woscitationindexConference Proceedings Citation Index - Science-
item.languageiso639-1en-
item.openairetypeConference Object-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

6
checked on Oct 18, 2025

Page view(s)

170
checked on Oct 20, 2025

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.