Search papers, labs, and topics across Lattice.
This paper introduces MAD, a novel defense against DRAM-based RowHammer attacks that combines memory allocation strategies with software diversity principles. MAD overcomes the entropy limitations of memory subsystems by employing two complementary spatial diversification techniques. The system aims to delay RowHammer attacks, providing opportunities for proactive responses like rebooting or in-depth attack analysis, while offering ease of implementation, negligible performance impact, and hardware/software agnosticism.
A memory allocation scheme inspired by software diversity can effectively delay RowHammer attacks, buying precious time for proactive defense measures.
Vulnerabilities emanating from DRAM errors pose a vexing problem that remains, as of yet, unsolved and elusive but cannot be ignored. Prior defenses focused on specific details of early RowHammer attacks and fail to generalize with the generalizations of recent RowHammer attacks. Even worse, it is presently not clear that techniques from prior defenses will be able to cope with these generalizations or if an entirely new approach is required. Although still work-in-progress, we have identified a new approach that combines memory allocation with principles underlying software diversity and shows promising early results. At first glance, software diversity seems to be an unlikely contender, since it faces seemingly insurmountable obstacles, primarily the lack of sufficient entropy in memory subsystems. Our system - called MAD, short for memory allocation diversity - leverages two novel, complementary spatial diversification techniques to overcome this entropy obstacle. Entropy aside, MAD offers ease-of-implementation, negligible performance impact, and is both hardware and software agnostic. From a security perspective, MAD's goal is to deter RowHammer attacks by delaying them to the maximum extent possible. Such a delay opens the door for a variety of additional responses, e.g., proactive rebooting, or complementary in-depth analysis of ongoing attacks that would be too slow for an always-on defense.