Latest from Memory

214182021 © Pavlineo | Dreamstime.com
promo__pavlineo_dreamstime_xxl_214182021
76795646 © Cybrain | Dreamstime.com
promo_cybrain_dreamstime_xxl_76795646
ID_52826136_albund_Dreamstime
promo_id_52826136__albund__dreamstime
Dreamstime_biancoblue_193063435
wifi_dreamstime_biancoblue_193063435
ID 20308395 © Ludinko | Dreamstime.com
ssd_dreamstime_l_20308395
Dreamstime_simongreig_17639917 and ATEK Access Technologies
dreamstime_simongreig_promo_17639917
ID 169214712 © Petrsvoboda91 | Dreamstime.com
Focus at SSD slot, type M.2 with support for NVMe, on computer motherboard.
Dreamstime_cookiecutter_100807069
Security risks with DRAM

Understanding Memory’s RowHammer Challenge (Download)

Nov. 7, 2024
Log in to download the PDF of this article on a new approach to remapping DRAM to address memory security challenges.

Read this article online.

Rapid growth in the world’s digital information has driven continued improvements in computing to process, organize, and monetize insights gathered from this data. The semiconductor industry has enabled these advances with smaller process geometries that deliver more transistors per die, faster processing, and more memory to store the data being used. However, as processing gets faster and devices shrink, the hardware has become increasingly susceptible to errors.

Each new generation of DRAM offers many advantages, including higher performance, better power efficiency, and higher capacity, which has led to it becoming entrenched as the choice for main memory. Packing bit cells more closely together on a die enables the industry to develop higher capacities, but it’s also introduced and exacerbated a vulnerability and attack vector for malicious actors to exploit.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!