When Mitigations Backfire: Timing Channel Attacks and Defense for PRAC-Based RowHammer Mitigations
International Symposium on Computer Architecture (ISCA), 2025
Main:15 Pages
17 Figures
Bibliography:4 Pages
7 Tables
Abstract
Per Row Activation Counting (PRAC) has emerged as a robust framework for mitigating RowHammer (RH) vulnerabilities in modern DRAM systems. However, we uncover a critical vulnerability: a timing channel introduced by the Alert Back-Off (ABO) protocol and Refresh Management (RFM) commands. We present PRACLeak, a novel attack that exploits these timing differences to leak sensitive information, such as secret keys from vulnerable AES implementations, by monitoring memory access latencies.
View on arXivComments on this paper
