论文标题
trrespass:利用目标行的许多侧面刷新
TRRespass: Exploiting the Many Sides of Target Row Refresh
论文作者
论文摘要
经过大量备受瞩目的Rowhammer攻击之后,CPU和DRAM供应商争先恐后地交付了针对RowHammer问题的确定硬件解决方案:Target Row Refresh(TRR)。从业者中的一个普遍信念是,对于受TRR保护的最新一代DDR4系统,Rowhammer在实践中不再是一个问题。但是,实际上,关于TRR知之甚少。在本文中,我们揭开了TRR的内部运作,并揭穿了其安全保证。我们表明,作为单一缓解机制所宣传的内容实际上是一系列在TRR下合并的不同解决方案。我们通过深入分析检查和披露不同的现有TRR解决方案,并证明现代实施完全在DRAM芯片中运行。尽管很难分析引起DRAM的缓解措施,但我们描述了新的技术来了解这些缓解机制的运作。这些见解使我们能够构建Trrespass,这是一种可扩展的黑盒Rowhammer fuzzer。 Trrespass表明,即使是最新一代的DDR4芯片,也可以使用所有已知的Rowhammer攻击,也常常仍然容易受到我们开发的Rowhammer的新TRR感知变体的影响。特别是,Trrespass发现,在现代DDR4模块上,当使用许多侵略者行时(在某些情况下多达19个)时,Rowhammer仍然是可能的,我们通常用一种方法指的是多面的Rowhammer。总体而言,我们的分析表明,来自所有三个主要DRAM供应商的42个模块中有13个容易受到我们的TRR吸引Rowhammer访问模式的影响,因此仍然可以安装现有的最新的Rowhammer攻击。除了DDR4外,我们还尝试了LPDDR4芯片,并表明它们也容易受到Rowhammer位的影响。我们的结果提供了具体的证据,表明必须继续追求更好的行锤缓解。
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to deliver what was meant to be the definitive hardware solution against the RowHammer problem: Target Row Refresh (TRR). A common belief among practitioners is that, for the latest generation of DDR4 systems that are protected by TRR, RowHammer is no longer an issue in practice. However, in reality, very little is known about TRR. In this paper, we demystify the inner workings of TRR and debunk its security guarantees. We show that what is advertised as a single mitigation mechanism is actually a series of different solutions coalesced under the umbrella term TRR. We inspect and disclose, via a deep analysis, different existing TRR solutions and demonstrate that modern implementations operate entirely inside DRAM chips. Despite the difficulties of analyzing in-DRAM mitigations, we describe novel techniques for gaining insights into the operation of these mitigation mechanisms. These insights allow us to build TRRespass, a scalable black-box RowHammer fuzzer. TRRespass shows that even the latest generation DDR4 chips with in-DRAM TRR, immune to all known RowHammer attacks, are often still vulnerable to new TRR-aware variants of RowHammer that we develop. In particular, TRRespass finds that, on modern DDR4 modules, RowHammer is still possible when many aggressor rows are used (as many as 19 in some cases), with a method we generally refer to as Many-sided RowHammer. Overall, our analysis shows that 13 out of the 42 modules from all three major DRAM vendors are vulnerable to our TRR-aware RowHammer access patterns, and thus one can still mount existing state-of-the-art RowHammer attacks. In addition to DDR4, we also experiment with LPDDR4 chips and show that they are susceptible to RowHammer bit flips too. Our results provide concrete evidence that the pursuit of better RowHammer mitigations must continue.