Quantifying Memory Cells Vulnerability for DRAM Security

πŸ“… 2026-03-19
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This work addresses the security implications of unintended bit flips in DRAM cells caused by charge leakage and interference, which jeopardize data integrity, confidentiality, and security mechanisms such as DRAM-based physically unclonable functions. For the first time, it establishes a direct link between device-level physical behavior and system-level security properties by introducing a quantifiable, cell-level vulnerability modeling framework. This framework integrates circuit-level charge leakage analysis, interference path modeling, and mapping to security attributes. The approach systematically reveals the non-uniformity and context dependence of DRAM vulnerability across diverse failure modes, offering both theoretical foundations and practical tools for evaluating and deploying DRAM in security-critical applications.

Technology Category

Application Category

πŸ“ Abstract
Dynamic Random Access Memory (DRAM) is pervasive in computer systems. Cell vulnerabilities caused by unintended phenomena (forced retention failure, latency alteration, rowhammer and rowpress) lead to unintended bit flips in memory. These phenomena have been explored as attacks to violate data integrity and confidentiality during normal operation, but also exploited as a benefit in security systems as a method to generate random secret keys and unique device fingerprints (e.g. Physically Unclonable Functions). In both cases, attackers may wish to exploit knowledge of individual cell flip vulnerability to predict the current/future data contents of a set of cells, which can be utilised to break security systems. In this work, we develop a quantitative, cell-level circuit framework that models DRAM vulnerability directly from its physical charge leakage and disturbance pathways. By linking these device-layer behaviours to system-level security properties, our framework enables systematic evaluation of DRAM with respect to volatility (retention), integrity (disturbance-induced modification), and confidentiality (pattern-dependent leakage). We further demonstrate how the framework can be applied to well-known failure modes, revealing non-uniform and context-dependent vulnerability patterns. This work provides both theoretical foundations and practical evaluation tools for evaluating the suitability of DRAM use within security applications.
Problem

Research questions and friction points this paper is trying to address.

DRAM security
bit flip vulnerability
memory cell reliability
data confidentiality
Physically Unclonable Functions
Innovation

Methods, ideas, or system contributions that make the work stand out.

DRAM vulnerability modeling
cell-level security analysis
charge leakage
disturbance-induced bit flips
physically unclonable functions
πŸ”Ž Similar Papers
No similar papers found.
Z
Zilong Hu
National University of Singapore, Singapore
H
Hongming Fei
National University of Singapore, Singapore
Prosanta Gope
Prosanta Gope
Associate Professor, Department of Computer Science, University of Sheffield
Network SecurityPrivacySmart-Grid SecurityIoT Security5G Security
J
Jack Miskelly
Queen’s University Belfast, United Kingdom
O
Owen Millwood
Wiznet, Germany
Biplab Sikdar
Biplab Sikdar
Provost's Chair Professor, National University of Singapore
Internet of ThingsCyber-Physical SystemsComputer Networks