SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh

AI-generated keywords: Rowhammer SoftTRR Security Kernel privilege ChipTRR

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • The paper addresses the issue of rowhammer attacks on level-1 page tables
  • Existing software-only mitigations are not effective against these attacks
  • SoftTRR is a software-only defense mechanism proposed by the authors
  • SoftTRR refreshes rows occupied by page tables when suspicious rowhammer activity is detected
  • SoftTRR overcomes limitations of ChipTRR, which can be bypassed by many-sided hammer attacks
  • SoftTRR protects an unlimited number of page tables by monitoring memory accesses to nearby rows
  • When access count exceeds a threshold, SoftTRR initiates a refresh for corresponding page-table rows
  • Experimental results show that SoftTRR successfully safeguards page tables with minimal overhead and memory cost
  • SoftTRR presents itself as a promising defense mechanism for protecting critical system components like level-1 page tables from unauthorized access and manipulation
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Nepal Surya, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu

Abstract: Rowhammer attacks that corrupt level-1 page tables to gain kernel privilege are the most detrimental to system security and hard to mitigate. However, recently proposed software-only mitigations are not effective against such kernel privilege escalation attacks. In this paper, we propose an effective and practical software-only defense, called SoftTRR, to protect page tables from all existing rowhammer attacks on x86. The key idea of SoftTRR is to refresh the rows occupied by page tables when a suspicious rowhammer activity is detected. SoftTRR is motivated by DRAM-chip-based target row refresh (ChipTRR) but eliminates its main security limitation (i.e., ChipTRR tracks a limited number of rows and thus can be bypassed by many-sided hammer). Specifically, SoftTRR protects an unlimited number of page tables by tracking memory accesses to the rows that are in close proximity to page-table rows and refreshing the page-table rows once the tracked access count exceeds a pre-defined threshold. We implement a prototype of SoftTRR as a loadable kernel module, and evaluate its security effectiveness, performance overhead, and memory consumption. The experimental results show that SoftTRR protects page tables from real-world rowhammer attacks and incurs small performance overhead as well as memory cost.

Submitted to arXiv on 20 Feb. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2102.10269v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In this paper titled "SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh," the authors address the issue of rowhammer attacks that corrupt level-1 page tables to gain kernel privilege, which is highly detrimental to system security and difficult to mitigate. They highlight that existing software-only mitigations are not effective against these types of kernel privilege escalation attacks. To tackle this problem, the authors propose an effective and practical software-only defense mechanism called SoftTRR. The key idea behind SoftTRR is to refresh the rows occupied by page tables whenever a suspicious rowhammer activity is detected. This approach is inspired by DRAM-chip-based target row refresh (ChipTRR), but SoftTRR overcomes ChipTRR's main security limitation, which is its ability to track only a limited number of rows and can be bypassed by many-sided hammer attacks. SoftTRR protects an unlimited number of page tables by monitoring memory accesses to the rows that are in close proximity to page-table rows. Once the tracked access count exceeds a pre-defined threshold, SoftTRR initiates a refresh for the corresponding page-table rows. To evaluate its effectiveness, performance overhead, and memory consumption, the authors implement a prototype of SoftTRR as a loadable kernel module. Experimental results demonstrate that SoftTRR successfully safeguards page tables from real-world rowhammer attacks while incurring minimal performance overhead and memory cost. By effectively countering rowhammer attacks on x86 systems, SoftTRR presents itself as a promising defense mechanism for protecting critical system components such as level-1 page tables from unauthorized access and manipulation. Overall, this research contributes significantly to enhancing system security by proposing an innovative software-only defense strategy that effectively mitigates rowhammer attacks on page tables.
Created on 06 Nov. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.