Authors
Kevin Loughlin, Stefan Saroiu, Alec Wolman, Yatin A Manerkar, Baris Kasikci
Publication date
2022/6/18
Book
Proceedings of the 49th Annual International Symposium on Computer Architecture
Pages
670-684
Description
Prior work shows that Rowhammer attacks---which flip bits in DRAM via frequent activations of the same row(s)---are viable. Adversaries typically mount these attacks via instruction sequences that are carefully-crafted to bypass CPU caches. However, we discover a novel form of hammering that we refer to as coherence-induced hammering, caused by Intel's implementations of cache coherent non-uniform memory access (ccNUMA) protocols. We show that this hammering occurs in commodity benchmarks on a major cloud provider's production hardware, the first hammering found to be generated by non-malicious code. Given DRAM's rising susceptibility to bit flips, it is paramount to prevent coherence-induced hammering to ensure reliability and security in the cloud.
Accordingly, we introduce MOESI-prime, a ccNUMA coherence protocol that mitigates coherence-induced hammering while retaining Intel's state-of …
Total citations
20222023202421610
Scholar articles
K Loughlin, S Saroiu, A Wolman, YA Manerkar… - Proceedings of the 49th Annual International …, 2022