Latest from Memory

ID 5549870 © Artistar | Dreamstime.com
hard_drive_dreamstime_l_5549870
ID 84308884 © Andy Chisholm - Dreamstime.com
promo_id_84308884__andy_chisholm__dreamstime
ID 88963268 © Jurij Boiko | Dreamstime.com
pcb_dreamstime_l_88963268
ID 23655199 © Pere Sanz | Dreamstime.com
oscilloscope_dreamstime_l_23655199
Dreamstime_Iuliia-Chernyshenko_156096018
dreamstime_iuliiachernyshenko_156096018
Future of Memory and Storage
promo__fms_2025__fmsnew
ID 107744852 © Ekkasit919 | Dreamstime.com
adas_dreamstime_l_107744852
Dreamstime_cookiecutter_100807069
Security risks with DRAM

Understanding Memory’s RowHammer Challenge (Download)

Nov. 7, 2024
Log in to download the PDF of this article on a new approach to remapping DRAM to address memory security challenges.

Read this article online.

Rapid growth in the world’s digital information has driven continued improvements in computing to process, organize, and monetize insights gathered from this data. The semiconductor industry has enabled these advances with smaller process geometries that deliver more transistors per die, faster processing, and more memory to store the data being used. However, as processing gets faster and devices shrink, the hardware has become increasingly susceptible to errors.

Each new generation of DRAM offers many advantages, including higher performance, better power efficiency, and higher capacity, which has led to it becoming entrenched as the choice for main memory. Packing bit cells more closely together on a die enables the industry to develop higher capacities, but it’s also introduced and exacerbated a vulnerability and attack vector for malicious actors to exploit.