When Mitigations Backfire: Timing Channel Attacks and Defense for PRAC-Based RowHammer Mitigations
By: Jeonghyun Woo , Joyce Qu , Gururaj Saileshwar and more
Potential Business Impact:
Steals secrets from computers through memory timing.
Per Row Activation Counting (PRAC) has emerged as a robust framework for mitigating RowHammer (RH) vulnerabilities in modern DRAM systems. However, we uncover a critical vulnerability: a timing channel introduced by the Alert Back-Off (ABO) protocol and Refresh Management (RFM) commands. We present PRACLeak, a novel attack that exploits these timing differences to leak sensitive information, such as secret keys from vulnerable AES implementations, by monitoring memory access latencies. To counter this, we propose Timing-Safe PRAC (TPRAC), a defense that eliminates PRAC-induced timing channels without compromising RH mitigation efficacy. TPRAC uses Timing-Based RFMs, issued periodically and independent of memory activity. It requires only a single-entry in-DRAM mitigation queue per DRAM bank and is compatible with existing DRAM standards. Our evaluations demonstrate that TPRAC closes timing channels while incurring only 3.4% performance overhead at the RH threshold of 1024.
Similar Papers
PRACtical: Subarray-Level Counter Update and Bank-Level Recovery Isolation for Efficient PRAC Rowhammer Mitigation
Hardware Architecture
Makes computer memory safer without slowing it down.
Per-Row Activation Counting on Real Hardware: Demystifying Performance Overheads
Hardware Architecture
Makes computer memory faster and more reliable.
Understanding and Mitigating Side and Covert Channel Vulnerabilities Introduced by RowHammer Defenses
Cryptography and Security
New attacks steal secrets using computer memory tricks.