17945702. ROW HAMMER MITIGATION USING A VICTIM CACHE simplified abstract (Micron Technology, Inc.)
ROW HAMMER MITIGATION USING A VICTIM CACHE
Organization Name
Inventor(s)
Ameen D. Akel of Rancho Cordova CA (US)
ROW HAMMER MITIGATION USING A VICTIM CACHE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17945702 titled 'ROW HAMMER MITIGATION USING A VICTIM CACHE
Simplified Explanation
Abstract
Row hammer attacks exploit the unintended consequences of memory devices, where memory cells interact electrically and can leak charges, potentially altering the contents of neighboring memory rows. To mitigate such attacks, a victim cache is utilized. Data is written to cache lines of a cache, and the least recently used cache line is then written to the victim cache.
Patent/Innovation Explanation
- Row hammer attacks take advantage of memory devices' electrical interactions between memory cells.
- Memory cells can leak charges and modify nearby memory rows that were not originally accessed.
- The patent proposes the use of a victim cache to counter row hammer attacks.
- Data is written to cache lines in a cache.
- The least recently used cache line in the cache is written to the victim cache.
Potential Applications
- Enhancing the security of memory devices against row hammer attacks.
- Protecting sensitive data stored in memory from unauthorized access or modification.
- Improving the reliability and integrity of memory systems in various computing devices.
Problems Solved
- Mitigates the risk of row hammer attacks that can compromise the security and integrity of memory systems.
- Addresses the unintended side effects of memory devices, such as charge leakage and unintended modification of neighboring memory rows.
- Provides a solution to protect against unauthorized access or modification of data stored in memory.
Benefits
- Enhances the security and reliability of memory systems.
- Reduces the vulnerability to row hammer attacks.
- Safeguards sensitive data stored in memory from unauthorized access or modification.
Original Abstract Submitted
Row hammer attacks takes advantage of unintended and undesirable side effects of memory devices in which memory cells interact electrically between themselves by leaking their charges and possibly changing the contents of nearby memory rows that were not addressed in an original memory access. Row hammer attacks are mitigated by using a victim cache. Data is written to cache lines of a cache. A least recently used cache line of the cache is written to the victim cache.