Leveraging Rowhammer for Physically Unique and Non-tamperable Device Identification

Research output: Contribution to journalConference articlepeer-review

Abstract

Dynamic Random Access Memory (DRAM) remains the most widely used memory in computer architecture. This paper explores identifying a device using DRAM for creating Physically Unclonable Functions (PUFs) from Rowhammer-induced bit flips, e.g., for binding software to industrial control systems. Our method utilizes a device's inherent properties, similar to biometric identification, and is applicable to legacy hardware and embedded devices that lack a Trusted Platform Module. Rowhammer causes bit flips due to repeated read access. It results from electrical charges leaking into adjacent cells, leading to data corruption and security risks. Our research indicates that these bit flips are not random. We use statistical fingerprints and the Mahalanobis distance to identify systems based on the error distribution, which is dependent on other system components like the memory controller. A PUF generated by our approach can therefore not be transferred to another system just by swapping memory modules.

Original languageEnglish
Pages (from-to)1154-1164
Number of pages11
JournalProcedia Computer Science
Volume253
Issue number253
DOIs
Publication statusPublished - 2025
EventISM 2024 6th International Conference on Industry 4.0 and Smart Manufacturing - Prag, Czech Republic
Duration: 20 Nov 202422 Nov 2024
https://www.msc-les.org/ism2024/

Keywords

  • Rowhammer
  • device identification
  • physically unclonable function
  • root of trust

Fingerprint

Dive into the research topics of 'Leveraging Rowhammer for Physically Unique and Non-tamperable Device Identification'. Together they form a unique fingerprint.

Cite this