{"id":781951,"date":"2021-10-25T16:09:33","date_gmt":"2021-10-25T23:09:33","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&#038;p=781951"},"modified":"2021-10-25T16:10:17","modified_gmt":"2021-10-25T23:10:17","slug":"mfit-a-bump-in-the-wire-tool-for-plug-and-play-analysis-of-rowhammer-susceptibility-factors","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/mfit-a-bump-in-the-wire-tool-for-plug-and-play-analysis-of-rowhammer-susceptibility-factors\/","title":{"rendered":"mFIT: A Bump-in-the-Wire Tool for Plug-and-Play Analysis of Rowhammer Susceptibility Factors"},"content":{"rendered":"<p>Understanding susceptibility to Rowhammer bit flips in DRAM (i.e., main memory) is vital to ensure reliability and security on today&#8217;s systems, particularly on multitenant cloud servers. However, existing tools for analyzing susceptibility either suffer from a lack of precision or are not broadly-compatible with cloud platforms.<\/p>\n<p>In this work, we introduce mFIT, a low-cost tool for characterizing Rowhammer susceptibility factors. mFIT operates as a &#8220;bump-in-the-wire&#8221; between the host&#8217;s memory controller and a DDR4 DRAM module, offering the ability to analyze both the host platform&#8217;s and DRAM&#8217;s influences on Rowhammer susceptibility. We show that mFIT offers &#8220;plug-and-play&#8221; support for analyzing the latest three generations of DDR4 server-grade DRAM modules from all three major DRAM manufacturers, using two different Intel server platforms. In addition to providing the first public evidence of worsening Rowhammer susceptibility in these modules, we show that mFIT can experimentally determine various factors&#8217; roles in Rowhammer susceptibility. Using this knowledge, we demonstrate per-module &#8220;Rowhammer-optimal&#8221; data patterns that average 60% more bit flips than prior work, offering researchers insights on how to construct stronger Rowhammer attacks and defenses.<\/p>\n<p>We <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/microsoft\/mfit\">open-sourced MFIT&#8217;s design<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> to help other researchers use our techniques to further the community&#8217;s understanding of Rowhammer and DRAM.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding susceptibility to Rowhammer bit flips in DRAM (i.e., main memory) is vital to ensure reliability and security on today&#8217;s systems, particularly on multitenant cloud servers. However, existing tools for analyzing susceptibility either suffer from a lack of precision or are not broadly-compatible with cloud platforms. In this work, we introduce mFIT, a low-cost tool [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":null,"msr_publishername":"","msr_publisher_other":"","msr_booktitle":"","msr_chapter":"","msr_edition":"","msr_editors":"","msr_how_published":"","msr_isbn":"","msr_issue":"","msr_journal":"","msr_number":"MSR-TR-2021-25","msr_organization":"Microsoft","msr_pages_string":"","msr_page_range_start":"","msr_page_range_end":"","msr_series":"","msr_volume":"","msr_copyright":"","msr_conference_name":"","msr_doi":"","msr_arxiv_id":"","msr_s2_paper_id":"","msr_mag_id":"","msr_pubmed_id":"","msr_other_authors":"","msr_other_contributors":"","msr_speaker":"","msr_award":"","msr_affiliation":"","msr_institution":"","msr_host":"","msr_version":"","msr_duration":"","msr_original_fields_of_study":"","msr_release_tracker_id":"","msr_s2_match_type":"","msr_citation_count_updated":"","msr_published_date":"2021-10-25","msr_highlight_text":"","msr_notes":"","msr_longbiography":"","msr_publicationurl":"","msr_external_url":"","msr_secondary_video_url":"","msr_conference_url":"","msr_journal_url":"","msr_s2_pdf_url":"","msr_year":0,"msr_citation_count":0,"msr_influential_citations":0,"msr_reference_count":0,"msr_s2_match_confidence":0,"msr_microsoftintellectualproperty":true,"msr_s2_open_access":false,"msr_s2_author_ids":[],"msr_pub_ids":[],"msr_hide_image_in_river":0,"footnotes":""},"msr-research-highlight":[],"research-area":[13558,13547],"msr-publication-type":[193718],"msr-publisher":[],"msr-focus-area":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-781951","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_publishername":"","msr_edition":"","msr_affiliation":"","msr_published_date":"2021-10-25","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"MSR-TR-2021-25","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"Microsoft","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"file","viewUrl":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/10\/mfit-msr-tr-2021-25-102521.pdf","id":"788084","title":"mfit-msr-tr-2021-25-102521","label_id":"243109","label":0}],"msr_related_uploader":"","msr_citation_count":0,"msr_citation_count_updated":"","msr_s2_paper_id":"","msr_influential_citations":0,"msr_reference_count":0,"msr_arxiv_id":"","msr_s2_author_ids":[],"msr_s2_open_access":false,"msr_s2_pdf_url":null,"msr_attachments":[{"id":788084,"url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/10\/mfit-msr-tr-2021-25-102521.pdf"}],"msr-author-ordering":[{"type":"user_nicename","value":"Lucian Cojocar","user_id":39718,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=Lucian Cojocar"},{"type":"text","value":"Kevin Loughlin","user_id":0,"rest_url":false},{"type":"user_nicename","value":"Stefan Saroiu","user_id":33716,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=Stefan Saroiu"},{"type":"text","value":"Baris Kasikci","user_id":0,"rest_url":false},{"type":"user_nicename","value":"Alec Wolman","user_id":30925,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=Alec Wolman"}],"msr_impact_theme":[],"msr_research_lab":[199565],"msr_event":[],"msr_group":[1148488],"msr_project":[1111488],"publication":[],"video":[],"msr-tool":[],"msr_publication_type":"techreport","related_content":{"projects":[{"ID":1111488,"post_title":"Project STEMA","post_name":"project-stema","post_type":"msr-project","post_date":"2024-12-11 17:04:24","post_modified":"2024-12-20 16:20:14","post_status":"publish","permalink":"https:\/\/www.microsoft.com\/en-us\/research\/project\/project-stema\/","post_excerpt":"STEMA: Secure, Trustworthy, and Enhanced Memory for Azure The mission of Project STEMA is to pursue memory technologies that provide increased security, trustworthiness, and performance to&nbsp;Microsoft Azure. Project STEMA is a collaborative effort&nbsp;involving AHSI, SCHIE, and&nbsp;Microsoft Research. We are also collaborating with many external partners both in industry and academia.","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/1111488"}]}}]},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/781951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":5,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/781951\/revisions"}],"predecessor-version":[{"id":788090,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/781951\/revisions\/788090"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=781951"}],"wp:term":[{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=781951"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=781951"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=781951"},{"taxonomy":"msr-publisher","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publisher?post=781951"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=781951"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=781951"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=781951"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=781951"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=781951"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=781951"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=781951"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=781951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}