Abstract
Approximate computing achieves high performance or less power consumption in various fault-tolerant applications, e.g., image processing, artificial intelligence (AI), etc. However, the introduction of approximate computing brings new security vulnerabilities, which threaten the entire computing system.
In this paper, a novel Rowhammer attack is proposed, which utilises the approximate data stored in DRAM memories to achieve higher attack effectiveness. Compared to Rowhammer attack to DRAM memory without approximate data, the proposed method achieves more bit-flips resulting in significant data corruption. The proposed attack is implemented and evaluated on DRAM chips with a real user case, object detection using neural network. The accuracy of detection on the baseline image is employed to verify the impact of proposed attack approach. The results show that the proposed Rowhammer attack with approximate data as aggressor rows introduces extra 33% bit-flips on victim rows than a conventional Rowhammer attack without approximate data. It also introduces up to ~75% accuracy reduction of MNIST neural network proportionally to the increment of attack activation number.
In this paper, a novel Rowhammer attack is proposed, which utilises the approximate data stored in DRAM memories to achieve higher attack effectiveness. Compared to Rowhammer attack to DRAM memory without approximate data, the proposed method achieves more bit-flips resulting in significant data corruption. The proposed attack is implemented and evaluated on DRAM chips with a real user case, object detection using neural network. The accuracy of detection on the baseline image is employed to verify the impact of proposed attack approach. The results show that the proposed Rowhammer attack with approximate data as aggressor rows introduces extra 33% bit-flips on victim rows than a conventional Rowhammer attack without approximate data. It also introduces up to ~75% accuracy reduction of MNIST neural network proportionally to the increment of attack activation number.
Original language | English |
---|---|
Title of host publication | IEEE International Symposium on Circuits and Systems (ISCAS) 2025: Proceedings |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Publication status | Accepted - 27 Jan 2025 |
Event | IEEE ISCAS International Symposium on Circuits and Systems (ISCAS) 2025 - London, United Kingdom Duration: 25 May 2025 → 28 May 2025 |
Publication series
Name | IEEE International Symposium on Circuits and Systems: Proceedings |
---|---|
ISSN (Print) | 0271-4302 |
ISSN (Electronic) | 2158-1525 |
Conference
Conference | IEEE ISCAS International Symposium on Circuits and Systems (ISCAS) 2025 |
---|---|
Country/Territory | United Kingdom |
City | London |
Period | 25/05/2025 → 28/05/2025 |
Keywords
- Rowhammer attack
- AxRA
- DRAM systems