Netinfo Security ›› 2025, Vol. 25 ›› Issue (5): 758-766.doi: 10.3969/j.issn.1671-1122.2025.05.008

Previous Articles     Next Articles

Research on Rowhammer Vulnerability Defense Method Based on Remapping Matrix

WANG Jianxin1, XU Hongke1,2(), XIAO Chaoen1, ZHANG Lei1   

  1. 1. Beijing Electronic Science and Technology Institute, Beijing 100070, China
    2. Jiande City Cryptography Bureau, Hangzhou 311699, China
  • Received:2024-10-18 Online:2025-05-10 Published:2025-06-10

Abstract:

Aiming at the problem of Rowhammer vulnerability in dynamic random access memory (DRAM) of domestic Advanced RISC Machines (ARM) architecture computers, this paper firstly introduced the remapping matrix, and analyzed the causes of Rowhammer vulnerability based on the remapping matrix. Secondly, a Rowhammer vulnerability defense method based on remapping matrix was proposed, which combined physical address remapping with disabling pagemap interface to defend against Rowhammer attacks. Finally, the remapping matrix was realized by changing the DRAM line decoder and column selectors, and the Rowhammer vulnerability defense method was tested on the domestic ARM architecture computers and Xilinx Zynq7000 series. At the same time, the security and performance of this method were analyzed by setting up Vivado integrated development environment. The functional test results show that the Rowhammer vulnerability defense method can effectively resist the Rowhammer attack. The security analysis results show that compared to not taking defensive measures, the occurrence rate of Rowhammer vulnerability decreased by 98.6%. The performance analysis results show that the decoder obtained after the introduction of this defense method has a latency of 0.783ns and a resource occupancy of about 0.002%, which is extremely low, and has little impact on the performance of domestic ARM architecture computers.

Key words: Rowhammer vulnerability, domestic ARM architecture computers, DRAM, remapping matrix

CLC Number: