TY - GEN
T1 - Implementing Rowhammer Memory Corruption in the gem5 Simulator
AU - France, Loïc
AU - Bruguier, Florent
AU - Mushtaq, Maria
AU - Novo, David
AU - Benoit, Pascal
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/1/1
Y1 - 2021/1/1
N2 - Modern computer memories have shown to have reliability issues. The main memory is the target of a security threat called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Numerous countermeasures have been proposed, some of the most efficient ones relying on memory controller modifications, which make them non-integrable in existing systems. These solutions have to be effective against attacks on current and future architectures and technology nodes. In order to prove the efficiency of such mitigation techniques, we have to use simulation platforms. Unfortunately, existing architecture simulators do not provide any implementation of unintended memory modifications like bit-flips. Integrating memory corruption into architecture simulators would allow the construction of attacks and mitigations for current and future computers, using feedback from the simulator. In this paper, we propose an implementation of the Rowhammer effect in the gem5 architecture simulator, demonstrate its capabilities and state its limitations.
AB - Modern computer memories have shown to have reliability issues. The main memory is the target of a security threat called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Numerous countermeasures have been proposed, some of the most efficient ones relying on memory controller modifications, which make them non-integrable in existing systems. These solutions have to be effective against attacks on current and future architectures and technology nodes. In order to prove the efficiency of such mitigation techniques, we have to use simulation platforms. Unfortunately, existing architecture simulators do not provide any implementation of unintended memory modifications like bit-flips. Integrating memory corruption into architecture simulators would allow the construction of attacks and mitigations for current and future computers, using feedback from the simulator. In this paper, we propose an implementation of the Rowhammer effect in the gem5 architecture simulator, demonstrate its capabilities and state its limitations.
U2 - 10.1109/RSP53691.2021.9806242
DO - 10.1109/RSP53691.2021.9806242
M3 - Conference contribution
AN - SCOPUS:85134172910
T3 - Proceedings - IEEE International Symposium on Rapid System Prototyping, RSP
SP - 36
EP - 42
BT - Proceedings of the 2021 32nd IEEE International Workshop on Rapid System Prototyping
PB - IEEE Computer Society
T2 - 32nd IEEE International Workshop on Rapid System Prototyping, RSP 2021
Y2 - 14 October 2021
ER -