Apparatuses and methods for countering memory attacks

Information

  • Patent Grant
  • 11664063
  • Patent Number
    11,664,063
  • Date Filed
    Thursday, August 12, 2021
    2 years ago
  • Date Issued
    Tuesday, May 30, 2023
    12 months ago
Abstract
Aggressor rows may be detected by comparing access count values of word lines to a threshold value. Based on the comparison, a word line may be determined to be an aggressor row. The threshold value may be dynamically generated, such as a random number generated by a random number generator. In some examples, a random number may be generated each time an activation command is received. Responsive to detecting an aggressor row, a targeted refresh operation may be performed.
Description
BACKGROUND

Information may be stored on individual memory cells of a memory as a physical signal (e.g., a charge on a capacitive element). The memory may be a volatile memory, and the physical signal may decay over time (which may degrade or destroy the information stored in the memory cells). It may be necessary to periodically refresh the information in the memory cells by, for example, rewriting the information to restore the physical signal to an initial value.


As memory components have decreased in size, the density of memory cells has greatly increased. Repeated access to a particular memory cell or group of memory cells (often referred to as a ‘row hammer’ attack) may cause an increased rate of data degradation in nearby memory cells. Some memories may identify addresses which are repeatedly accessed so that the nearby memory cells may be refreshed to avoid damage from row hammer attacks. As memory devices are developed to resist certain types of attacks, the memory devices may remain vulnerable to new and/or different types of attacks. Accordingly, continued advances in memory attack management are desirable.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of a semiconductor device according to an embodiment of the present disclosure.



FIG. 2 is a block diagram of a refresh address control circuit according to an embodiment of the present disclosure.



FIG. 3 is a block diagram of a threshold generator circuit according to an embodiment of the present disclosure.



FIG. 4 is a flow chart of a method according to an embodiment of the present disclosure.



FIG. 5 is an example aggressor row detector circuit 5 according to an embodiment of the present disclosure.





DETAILED DESCRIPTION

The following description of certain embodiments is merely exemplary in nature and is in no way intended to limit the scope of the disclosure or its applications or uses. In the following detailed description of embodiments of the present systems and methods, reference is made to the accompanying drawings which form a part hereof, and which are shown by way of illustration specific embodiments in which the described systems and methods may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice presently disclosed systems and methods, and it is to be understood that other embodiments may be utilized and that structural and logical changes may be made without departing from the spirit and scope of the disclosure. Moreover, for the purpose of clarity, detailed descriptions of certain features will not be discussed when they would be apparent to those with skill in the art so as not to obscure the description of embodiments of the disclosure. The following detailed description is therefore not to be taken in a limiting sense, and the scope of the disclosure is defined only by the appended claims.


Various patterns of access to the memory (generally referred to as attacks) may cause an increased rate of data degradation in one or more memory cells, such that they would decay before they can be refreshed as part of the auto-refresh operation. For example, repeated access to a particular row of memory (e.g., an aggressor row) may cause an increased rate of decay in rows (e.g., victim rows) which are close to the aggressor row. These repeated accesses may be part of a deliberate attack against the memory and/or may be due to ‘natural’ access patterns of the memory. The increased rate of decay in the victim rows may require that they be refreshed as part of a targeted refresh operation. The targeted refresh operations may be in addition to the auto refresh operations. The memory device may periodically perform targeted refresh operations. Additionally or alternatively, the memory device may perform one or more targeted refresh operations “as needed.” That is, the targeted refresh operations may not be periodic (e.g., regularly scheduled). The targeted refresh operations may occur intermixed with auto-refresh operations. For example, the memory device may perform a set of refresh operations including a number of auto refresh operations, and a number of targeted refresh operations and then repeat this cycle. A memory device may generally cycle between performing access operations for a period of time, performing refresh operations for a period of time, performing access operations and so forth.


In some memory devices, the memory device may pause its “normal” operations of responding to commands from an external device (e.g., a memory controller) to perform the targeted refresh operations. During periods where the memory device performs targeted refresh operations, the memory device may activate (e.g., assert) a signal (e.g., a “busy” signal) on a pin, which may be referred to as a ready/wait pin or an alert pin. The signal provided to the pin may be received by the external device. Responsive to the active signal on the pin, the external device may stop providing commands to the memory device, sometimes referred to as a command bus stall. After the targeted refresh operations are completed, the memory device may deactivate the signal on the pin, and the external device may resume providing commands to the memory device. An example of a memory device with a pin for alerting an external device that the memory device is busy performing targeted refresh operations may be found in U.S. application Ser. No. 17/102,266 which is incorporated herein by reference for any purpose.


Memory devices may include circuitry for detecting aggressor rows and determining the corresponding victim rows to be refreshed during targeted refresh operations. When the circuitry determines that the row meets one or more criteria, the row may be determined to be an aggressor row. Victim rows of the aggressor row may then be determined and refreshed during targeted refresh operations. In some applications, a number of accesses to a row may be used to identify aggressor rows. When a number of accesses of a row reaches a threshold (e.g., threshold value) within a certain period of time, the memory device may determine the row is an aggressor row. However, certain memory attacks may take advantage of the use of a threshold. A memory attack may access a set of word lines to increase the number of accesses just below the threshold. Once several word lines have been accessed a number of times just below the threshold, the word lines may be accessed simultaneously, near simultaneously, or in quick succession. This may cause an overflow of a targeted refresh queue and/or the memory device to assert the ready/wait pin for an unacceptably long period of time as it refreshes all of the numerous victim rows. The unavailability of the memory device to respond to external commands during the targeted refresh operations may reduce performance of a system including the memory device and/or cause a malfunction of the system.


The present disclosure is directed to techniques for providing dynamic thresholds for detecting aggressor rows. In some embodiments, the dynamic threshold may be based, at least in part, on a random number provided by a random number generator. Comparing a number of accesses of a row to a dynamic threshold may reduce the occurrence of several word lines being detected as aggressors in a short period of time. Thus, the length of time the memory device is unavailable due to performing targeted refresh operations may remain within an acceptable time period.


While in general the present disclosure refers to determining aggressor and victim word lines and addresses, it should be understood that as used herein, an aggressor word line does not necessarily need to cause data degradation in neighboring word lines, and a victim word line does not necessarily need to be subject to such degradation. A memory may use some criteria to judge whether an address is an aggressor address, which may capture potential aggressor addresses rather than definitively determining which addresses are causing data degradation in nearby victims. Similarly, victim addresses may be determined based on which word lines are expected to be effected by aggressors, rather than a definitive determination of which word lines are undergoing an increased rate of data decay.



FIG. 1 is a block diagram of a semiconductor device according to at least one embodiment of the disclosure. The semiconductor device 100 may be a semiconductor memory device, such as a DRAM device integrated on a single semiconductor chip.


The semiconductor device 100 includes a memory array 118. The memory array 118 is shown as including a plurality of memory banks. In the embodiment of FIG. 1, the memory array 118 is shown as including N+1 memory banks BANK0-BANKN, where N is a whole number. The memory array 118 may include any number of banks (e.g., 1, 4, 8, 16). Each memory bank includes multiple word lines WL (rows), multiple bit lines BL and/BL (columns), and multiple memory cells MC arranged at intersections of the plurality of word lines WL and the plurality of bit lines BL and/BL.


In some embodiments, such as the one shown in FIG. 1, some of the memory cells MC along the word lines may be counter memory cells 126. The counter memory cells 126 may be positioned at the intersection of counter bit lines and the word lines. There may be multiple counter memory cells 126 along a given word line, and collectively the values stored in the counter memory cells 126 may represent a respective access count XCount of the word line (e.g., a number of times the word line has been activated). A data bus associated with the counter memory cells 126 may be coupled to the refresh address control circuit 116. The data bus associated with the counter memory cells 126 may be separate from the data bus which couples the other memory cells to the 10 circuit 122.


The selection of the word line WL is performed by a row decoder circuit 108 and the selection of the bit lines BL is performed by a column decoder 110. In the embodiment of FIG. 1, the row decoder circuit 108 includes a respective row decoder for each memory bank and the column decoder circuit 110 includes a respective column decoder for each memory bank. The bit lines BL are coupled to a respective sense amplifier (SAW). Read data from the bit line BL is amplified by the sense amplifier SAMP, and transferred to read/write amplifiers 120 over complementary local data lines (LIOT/B), transfer gate (TG), and complementary main data lines (MIOT/B). Conversely, write data outputted from the read/write amplifiers 120 is transferred to the sense amplifier SAMP over the complementary main data lines MIOT/B, the transfer gate TG, and the complementary local data lines LIOT/B, and written in the memory cell MC coupled to the bit line BL. Information may generally be read from and written to the counter memory cells 126 in an analogous fashion, except that the data in the counter memory cells 126 are read and written by the refresh address control circuit 116.


The semiconductor device 100 may employ a plurality of external terminals that include command and address (C/A) terminals coupled to a command and address bus to receive commands and addresses, and a CS signal, clock terminals to receive clocks CK_t and CK_c, data terminals DQ to provide data, and power supply terminals to receive power supply potentials VDD, VSS, VDDQ, and VSSQ.


The clock terminals are supplied with external clocks CK_t and CK_c that are provided to an input circuit 112. The external docks may be complementary. The input circuit 112 generates an internal clock ICLK based on the CK_t and clocks. The ICLK clock is provided to the command decoder 110 and to an internal clock generator 114. The internal clock generator 114 provides various internal clocks LCLK based on the ICLK clock. The LCLK clocks may be used for timing operation of various internal circuits. The internal data clocks LCLK are provided to the input/output circuit 122 to time operation of circuits included in the input/output circuit 122, for example, to data receivers to time the receipt of write data.


The C/A terminals may be supplied with memory addresses. The memory addresses supplied to the C/A terminals are transferred, via a command/address input circuit 102, to an address decoder circuit 104. The address decoder circuit 104 receives the address and supplies a decoded row address XADD to the row decoder circuit 108 and supplies a decoded column address YADD to the column decoder circuit 110. The address decoder circuit 104 may also supply a decoded bank address BADD, which may indicate the bank of the memory array 118 containing the decoded row address XADD and column address YADD. The C/A terminals may be supplied with commands. Examples of commands include timing commands for controlling the timing of various operations, access commands for accessing the memory, such as read commands for performing read operations and write commands for performing write operations, as well as other commands and operations. The access commands may be associated with one or more row address XADD, column address YADD, and bank address BADD to indicate the memory cell(s) to be accessed. In some embodiments, the commands and/or addresses may be provided by a component external to the device 100, for example, as shown in FIG. 1, a memory controller 101 in communication with the device 100.


The received commands may be provided as internal command signals to a command decoder circuit 106 via the command/address input circuit 102. The command decoder circuit 106 includes circuits to decode the internal command signals to generate various internal signals and commands for performing operations. For example, the command decoder circuit 106 may provide a row command signal to select a word line and a column command signal to select a bit line.


The device 100 may receive an access command which is a row activation command ACT. When the row activation command ACT is received, a bank address BAUD and a row address XADD are timely supplied with the row activation command ACT.


The device 100 may receive access commands for performing read operations. When the commands are received, and a bank address, a row address and a column address are timely supplied with the commands, read data is read from memory cells MC in the memory, array 118 corresponding to the row address and column address. The commands are received by the command decoder circuit 106, which provides internal commands so that read data from the memory array 118 is provided to the read/write amplifiers 120. The read data is output to outside from the data terminals DQ via the input/output circuit 122.


The device 100 may receive access commands for performing write operations. When the commands are received, and a bank address, a row address and a column address are timely supplied with the commands, write data supplied to the data terminals DQ is written to a memory cells in the memory array 118 corresponding to the row address and column address. The commands are received by the command decoder circuit 106, which provides internal commands so that the write data is received by data receivers in the input/output circuit 122. Write clocks may also be provided to the external clock terminals for timing the receipt of the write data by the data receivers of the input/output circuit 122. The write data is supplied via the input/output circuit 122 to the read/write amplifiers 120, and by the read/write amplifiers 120 to the memory array 118 to be written into the memory cell MC.


The device 100 may also receive commands causing it to carry out one or more refresh operations as part of a self-refresh mode. The device 100 may be periodically placed in a refresh mode. Thus, refresh operations may be performed periodically each time the memory device is in the refresh mode. In some embodiments, the refresh mode command may be externally issued to the memory device 100, such as by memory controller 101. In some embodiments, the refresh mode command may be periodically generated by a component of the device 100. In some embodiments, when an external signal indicates a refresh mode entry command (e.g., an external refresh command), the refresh signal AREF may also be activated. The refresh signal AREF may be a pulse signal which is activated when the command decoder circuit 106 receives a signal which indicates entry to the self-refresh mode. The refresh signal AREF may be activated once immediately after command input, and thereafter may be cyclically activated at desired internal timing. In some embodiments, the refresh signal AREF may cause more than one refresh operation to be performed, which may be referred to as a “multi pump” refresh. In some embodiments, the refresh signal AREF may be active during the refresh mode. In some embodiments, the refresh signal AREF may be active during the multiple refresh operations. The refresh signal AREF may be used to control the timing of refresh operations during the refresh mode. A self-refresh exit command may cause the automatic activation of the refresh signal AREF to stop and may cause the device 100 to return to an idle state and/or resume other operations.


The refresh signal AREF is supplied to the refresh control circuit 116. The refresh control circuit 116 supplies a refresh row address RXADD to the row decoder circuit 108, which may refresh one or more word lines WL indicated by the refresh row address RXADD. In some embodiments, the refresh address RXADD may represent a single word line. In some embodiments, the refresh address RXADD may represent multiple word lines, which may be refreshed sequentially or simultaneously by the row decoder circuit 108. In some embodiments, the number of word lines represented by the refresh address RXADD may vary from one refresh address to another. The refresh control circuit 116 may control a timing of the refresh operation, and may generate and provide the refresh address RXADD. The refresh control circuit 116 may be controlled to change details of the refreshing address RXADD (e.g., how the refresh address is calculated, the timing of the refresh addresses, the number of word lines represented by the address), or may operate based on internal logic.


The refresh control circuit 116 may selectively output a targeted refresh address (e.g., which specifies one or more victim addresses based on an aggressor) or an automatic refresh address (e.g., from a sequence of auto refresh addresses) as the refresh address RXADD. Based on the type of refresh address RXADD, the row decoder circuit 108 may perform a targeted refresh or auto refresh operation. The automatic refresh addresses may be from a sequence of addresses which are provided based on activations of the refresh signal AREF and/or pumps generated responsive to AREF. The refresh control circuit 116 may cycle through the sequence of auto refresh addresses at a rate determined by AREF. In some embodiments, the auto refresh operations may generally occur with a timing such that the sequence of auto refresh addresses is cycled such that no information is expected to degrade in the time between auto refresh operations for a given word line. In other words, auto refresh operations may be performed such that each word line is refreshed at a rate faster than the expected rate of information decay.


The refresh address control circuit 116 may also determine targeted refresh addresses which are addresses that require refreshing victim addresses corresponding to victim rows) based on the access pattern of nearby addresses (e.g., aggressor addresses associated with aggressor rows) in the memory array 118. The refresh address control circuit 116 may monitor accesses to the different word lines WL of the memory bank. As described in U.S. Pat. No. 10,770,127, which is incorporated herein by reference for any purpose, when the row decoder circuit 108 sends an access command to a particular row, the information in the counter memory cells 126 along that row may be read to the refresh address control circuit 116 as the access count Xcount. The refresh address control circuit 116 may determine an access count of the row based on the values stored in the counter memory cells 126 of the accessed row.


The refresh address control circuit 116 may determine if the accessed row is an aggressor row based on the access count from the counter memory cells 126. In some embodiments, the refresh control circuit 116 may compare the access count value XCount to a threshold value. Based on the comparison, the refresh control circuit 116 may determine whether the current row is an aggressor row. For example, if the access count value XCount is equal to or above the threshold value, the current row may be determined to be an aggressor row.


According to embodiments of the present disclosure, rather than being a static value, the threshold value may be a random number (as used herein, random collectively refers to “truly” random, quasi-random, and pseudorandom). In some embodiments, the refresh address control circuit 116 may generate a random number as the threshold value each time an activation ACT command is received. In some embodiments, the random number is a number generated within a defined range (e.g., 1,000-2,000). In some embodiments, the threshold value may be a combination of a fixed number and a randomly generated offset. For example, the fixed number may be 1,000 and the offset is a random number between 50 and +50 and the threshold value is the sum of the fixed number and the offset. The numbers and ranges provided herein are merely exemplary and other numbers and ranges may be used in other embodiments. The numbers and ranges selected for the threshold value may be based on one or more factors such as word line density, system criticality, and/or materials used for the memory cells MC. In some embodiments, the range of the random number, the range of the offset, and/or the fixed number may be hardwired in the device 100. In some embodiments, these values may be programmable values stored in the device 100. For example, the range of the random number, the range of the offset, and/or the fixed number may be stored in a mode register 128 and written to the mode register with a mode register write command. The mode register 128 may then provide the programmed values to the refresh control circuit 116.


Returning to the determination made by the refresh address control circuit 116, the current row is not an aggressor row, the value of the access count may be changed and then the refresh address control circuit may write the new value of the access count back to the counter memory cells 126 of the accessed row. If the refresh address control circuit 116 determines that the accessed row is an aggressor, then the refresh address control circuit 116 may use the row address XADD of the accessed row to determine one or more victim row addresses and provide them as a refresh address RXADD as part of a targeted refresh operation. When the accessed row is determined to be an aggressor, the access count Xcount associated with that row may be reset (e.g., to a minimum value, such as 0). In some embodiments, the refresh address control circuit 116 may queue up identified aggressor addresses (e.g., in a register) for later use in targeted refresh operations. The refresh address RXADD may be provided with a timing based on a timing of the refresh signal AREF.


The refresh control circuit 116 may use multiple methods to determine the timing of targeted refresh operations. In some embodiments, the refresh control circuit 116 may have periodic targeted refresh operations during a refresh mode, where the refresh control circuit 116 performs auto refresh operations and targeted refresh operations (e.g., by providing a targeted refresh address as the refresh address RXADD) based on a periodic schedule. For example, after entering a refresh mode, the refresh control circuit 116 may perform a certain number of auto refresh operations, and then perform a certain number of targeted refresh operations.


In some embodiments, the refresh control circuit 116 may perform targeted refresh operations responsive to determining an accessed row is an aggressor row. Targeted refresh operations performed responsive to the detected aggressor row may be in addition to or instead of periodic targeted refresh operations. In some embodiments, the targeted refresh operations responsive to the detection of the aggressor row may be performed outside of a regularly scheduled refresh mode. In some embodiments, the refresh control circuit 116 may activate (e.g., assert) a busy signal BUSY, which may be provided to an external pin of device 100, such as an alert pin ALERT and/or Ready-Wait pin. The busy signal BUSY may be received by an external device, such as the memory controller 101, via the external pin. The busy signal BUSY may notify the external device that the device 100 is performing targeted refresh operations and is not available to perform access operations. In some embodiments, responsive to the active busy signal BUSY, the memory controller 101 may pause (e.g., delay) providing further access commands and/or other commands to the device 100. In some embodiments, the memory controller 101 may cancel one or more queued commands responsive to the active busy signal BUSY. Once the targeted refresh operations have been completed, the refresh control circuit 116 may deactivate the busy signal BUSY. The memory controller 101 may resume providing commands to the device 100 responsive to the deactivated busy signal BUSY.


The power supply terminals are supplied with power supply potentials VDD and VSS. The power supply potentials VDD and VSS are supplied to an internal voltage generator circuit 124. The internal voltage generator circuit 124 generates various internal potentials VPP, VOD, VARY, VPERI, and the like based on the power supply potentials VDD and VSS supplied to the power supply terminals. The internal potential VPP is mainly, used in the row decoder 108, the internal potentials VOD and VARY are mainly used in the sense amplifiers SAMP included in the memory array 118, and the internal potential VPERI is used in many peripheral circuit blocks.


The power supply terminals are also supplied with power supply potentials VDDQ and VSSQ. The power supply potentials VDDQ and VSSQ are supplied to the input/output circuit 122. The power supply potentials VDDQ and VSSQ supplied to the power supply, terminals may be the same potentials as the power supply potentials VDD and VSS supplied to the power supply terminals in an embodiment of the disclosure. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals may be different potentials from the power supply potentials VDD and VSS supplied to the power supply terminals in another embodiment of the disclosure. The power supply potentials VDDQ and VSSQ supplied to the power supply terminals are used for the input/output circuit 122 so that power supply noise generated by the input/output circuit 122 does not propagate to the other circuit blocks.



FIG. 2 is a block diagram of a refresh control circuit according to an embodiment of the present disclosure. For context, a row decoder 208, a DRAM interface 240, and a memory array 218 are also shown. In some embodiments, the refresh control circuit 216 may be used to implement the refresh control circuit 116 of FIG. 1. Similarly, the row decoder 208 may be used to implement the row decoder circuit 108, and the memory array 218 may be used to implement memory array 118 of FIG. 1. Certain internal components and signals of the refresh control circuit 216 are shown to illustrate the operation of the refresh control circuit 216. The dotted line around the refresh control circuit 216, the row decoder 208, and the memory array 218 is shown to represent that in certain embodiments, each of the components within the dotted line may correspond to a particular bank of memory (e.g., memory banks BANK0-N of memory array 118), and that these components may be repeated for each of the banks of memory. In some embodiments, the components shown within the dotted line may be associated with each of the memory banks. Thus, there may be multiple refresh control circuits 216 and row decoders 208. For the sake of brevity, components for only a single bank will be described.


A DRAM interface 240 may provide one or more signals to the address refresh control circuit 216 and row decoder 208 which in turn (along with a column decoder, not shown) may perform access operations on the memory array 218. The DRAM interface 240 may represent one or more components which provides signals to components of the bank. In some embodiments, the DRAM interface 240 may include a memory controller coupled to the semiconductor memory device (e.g., memory controller 101). In some embodiments, the DRAM interface 240 may represent one or more components of a semiconductor device (e.g., device 100) such as the command address input circuit 102, the address decoder 104, and/or the command decoder circuit 106 of FIG. 1. The DRAM interface 240 may provide a row address XADD, the auto-refresh signal AREF, an activation signal ACT, and a, precharge signal Pre. The auto-refresh signal AREF may be a periodic signal which may indicate when an auto-refresh operation is to occur. The activation signal ACT may be provided to activate a given bank of the memory. The precharge signal Pre may be provided to precharge the given bank of the memory. The row address XADD may be a signal which specifies one or more particular word lines of the memory array 218, and may be a signal including multiple bits (which may be transmitted in series or in parallel).


In some embodiments, the refresh control circuit 216 may include a counter circuit 228, a threshold comparator circuit 230, a threshold generator circuit 232, an RHR state control circuit 242, an aggressor address register 244, and a refresh address generator 250.


The counter circuit 228 may be coupled to the memory array 218, particularly, to the count value memory cells 226 of the memory array 218. The count value memory cells 226 may be used to implement the count value memory cells 126 in some embodiments. When a word line of the memory array 218 is accessed, the value XCount of the count value memory cells 226 along that word line are read to the counter circuit 228. The counter circuit 228 may determine a value of the access count for that row based on the value(s) read from the count value memory cells 226. The counter circuit 228 may provide the access count CNT to the threshold comparator circuit 230.


The threshold comparator circuit 230 may compare the access count CNT to a threshold value. Based on the comparison, the threshold comparator circuit 230 may activate a trigger signal TRIG that is provided to the counter circuit 228, the aggressor address register 244, and/or the REM state control circuit 342. For example, the threshold comparator circuit 230 may determine if the value of the access count CNT for the word line exceeds the threshold value (e.g., if the value is greater than the threshold value) or is equal to a threshold value. If the value is not equal to or does not exceed the threshold (e.g., if the value is less than the threshold), then the threshold comparator circuit 230 may not activate the trigger signal TRIG. Responsive to the inactive (e.g., unasserted) TRIG, the counter circuit 228 may update (e.g, change) a value of the access count CNT and write the updated count XCount hack to the count value memory cells 226. Updating the count may include incrementing or decrementing the count in some embodiments.


If the threshold comparator circuit 230 determines the count value CNT does equal or exceed the threshold, then the current address XADD may be determined to be an aggressor address. If the current address XADD is an aggressor address, TRIG may be activated. Responsive to the active TRIG, the aggressor address register 244 may record (e.g., latch) the current value of the row address XADD. In some embodiments, the active TRIG may further cause the RHR state control circuit 342 to trigger a targeted refresh operation. Further in response to the active TRIG, the counter circuit 228 may reset a value of the count, for example, by writing an initial value of the count (e.g., 0) back to the count value memory cells 226.


In some embodiments, the threshold comparator circuit 230 may receive the threshold value TV from a threshold generator circuit 232. The threshold generator circuit 232 may receive the activation signal ACT from the DRAM interface 240. Responsive to the ACT signal, the threshold generator circuit 232 may generate the threshold value TV provided to the threshold comparator circuit 230. Other signals may be used instead of or in addition to the ACT signal to generate a new random number. For example, the refresh signal AREF, an internal clock signal and/or a signal from an oscillator circuit included in the memory device may be used. In some embodiments, the threshold value TV may be a random number within a desired rage of values (e.g., 1,000-2,000). In some embodiments, the threshold value TV may be a fixed number (e.g., 1,500) combined with a randomly generated offset (e.g., −100 to +100).


The RHR state control circuit 242 may receive the AREF signal from the DRAM interface and the TRIG signal from the threshold comparator circuit 230. The MIR state control circuit 242 may provide an active signal RHR to indicate that a targeted refresh operation, such as a row hammer refresh (e.g., a refresh of the victim rows corresponding to an identified aggressor row) should occur. In some embodiments, the RHR state control circuit 242 may further provide a BUSY signal to the DRAM interface 240 to indicate performance of the targeted refresh operation. The MIR state control circuit 242 may also provide an active internal refresh signal IREF, to indicate that an auto-refresh operation should occur. The auto-refresh signal AREF may be periodically activated and may be used to control the timing of refresh operations. In some embodiments, the signals RHR and IREF may be activated such that they are not active at the same time (e.g., are not both at a high logic level at the same time).


The memory device may carry out a sequence of auto-refresh operations in order to periodically refresh the rows of the memory device. The RHR signal may be activated in order to indicate that the device should refresh a particular targeted row (e.g., a victim row) instead of an address from the sequence of auto-refresh addresses. The MK state control circuit 242 may use internal logic to provide the active RHR signal. For example, in some embodiments, the RHR state control circuit 242 may provide the active RHR signal based on certain number of activations of AREF (e.g., every 4th activation of AREF). Additionally or alternatively, the RHR state control circuit 242 may activate the RHR signal responsive to receiving an active TRIG signal from the threshold comparator circuit 230. In some embodiments, the active TRIG may trigger the refresh control circuit 216 to cause a targeted refresh operation to be performed outside the time period of a regularly scheduled refresh operation.


In some embodiments, the RHR state control circuit 242 may activate the BUSY signal during targeted refresh operations. In some embodiments, the BUSY signal may be activated when the RHR signal is activated. In some embodiments, the BUSY signal may be activated only when the RHR signal is activated outside a regularly scheduled refresh period and/or when the TRIG signal is activated. The active BUSY signal may notify other components of the semiconductor device including the refresh control circuit 216 or a component in communication with the device (e.g., a memory controller) that the memory array 218 is unavailable for access operations. In some embodiments, the BUSY signal may be provided to an externally available pin of a semiconductor device including the refresh control circuit 216 (e.g., an alert pin). When the targeted refresh operation is completed, the RHR state control circuit 242 may deactivate the BUSY signal.


Responsive to an activation of RHR, the aggressor address register 244 may provide an aggressor address HitXADD, and the refresh address generator 250 may provide a refresh address RXADD, which may be one or more victim addresses associated with HitXADD (e.g., row addresses of victim rows of the identified aggressor row). Responsive to IREF, the refresh address generator 250 may provide an auto-refresh address as the refresh address RXADD. The row decoder 208 may perform a refresh operation responsive to the refresh address RXADD and the targeted refresh signal RHR. The row decoder 208 may perform an auto-refresh operation based on the refresh address RXADD and the internal refresh signal IREF.


The aggressor address register 244 may store one or more row addresses which have been identified as aggressor addresses by the threshold comparator circuit 230. Responsive to the active TRIG from the threshold comparator circuit 230, the aggressor address register 244 may store the current row address XADD which is being accessed. The aggressor address register 244 may provide the stored address as a match address HitXADD to the refresh address generator 250, which may calculate one or more victim addresses associated with the match address HitXADD. In some embodiments, the aggressor address register 244 may be a latch circuit which stores a single address. In some embodiments, the aggressor address register 244 may be a buffer which stores multiple addresses, and provides the first stored address as the match address HitXADD. The aggressor address register 244 may switch to a next address in the register after the victim row(s) associated with the first address have been refreshed.


The refresh address generator 250 may receive the targeted refresh signal RHR and the match address HitXADD. The match address HitXADD may represent an aggressor row. The refresh address generator 250 may determine the locations of one or more victim rows based on the match address HitXADD and provide them as the refresh address RXADD. In some embodiments, the victim rows may include rows which are physically, adjacent to the aggressor row or rows (e.g., HitXADD+1 and HitXADD−1). Other physical relationships between victim rows and the identified aggressor rows may also or alternatively be used in other examples.


The refresh address generator 250 may determine the value of the refresh address RXADD based on the targeted refresh signal RHR and the internal auto-refresh signal IREF. In some embodiments, when the signal IREF is active, the refresh address generator 250 may provide one of a sequence of auto refresh addresses. When the signal RHR is active, the refresh address generator 250 may provide a targeted refresh address, such as a victim address, as the refresh address RXADD. In some embodiments, multiple targeted refresh addresses may be provided for a refresh operation.


The row decoder 208 may perform one or more operations on the memory array 218 based on the received signals and addresses. For example, responsive to the activation signal ACT and the row address XADD (and IREF and RHR being inactive), the row decoder 208 may direct one or more access operations (for example, a read operation) on the specified row address XADD. Responsive to the RHR signal being active, the row decoder 208 may refresh the refresh address RXADD. In some embodiments, the counter circuit 228 may increment the access count stored in the count value memory cells 226 responsive to a refresh operation of a given row. In some embodiments, the counter circuit 228 may not increment the access count responsive to a refresh operation.


If an attack caused several of the access count values XCount in the counter memory cells 226 to increase up to a similar value, it is unlikely that several of the word lines would trigger the threshold comparator 230 in a short period of time because the threshold value is dynamic rather than static. It is likely some of the word lines will trigger the threshold comparator 230 sooner and other word lines will trigger the threshold comparator 230 later based on the access count values as the threshold value varies each time. In some applications, this may prevent the aggressor address register 344 from “overflowing” and/or requiring the RHR state control circuit 342 to assert the BUSY signal for an unacceptably long period of time.



FIG. 3 is a block diagram of a threshold generator circuit according to an embodiment of the present disclosure. In some embodiments, the threshold generator circuit 332 may be used to implement the threshold generator circuit 232 of FIG. 2. In some embodiments, the threshold generator circuit 332 may include a random number generator circuit 352. Optionally, the threshold generator circuit 332 may include a fixed value storage circuit 354 and a combining circuit 356.


The random number generator circuit 352 may provide a random number responsive to activation of an activation signal ACT. In some embodiments, the random number generator circuit 352 may provide the random number as a threshold value TV. The threshold value may be received by a threshold comparator circuit, such as threshold comparator circuit 230 shown in FIG. 2. In some embodiments, the random number generator circuit 352 may provide a random number within a desired range (e.g., −50 to +50, 2,000 to 3,000). In some embodiments, in addition to or instead of a fixed range, the range may be defined, at least in part, by a mean and/or standard deviation. The range may be set (e.g., hardwiring, fuse blowing, anti-fuses) or programmable (e.g., programmable latch or register, such as mode register 128).


Any suitable random number generator now known or developed in the future may be used to implement the random number generator circuit 352. Examples include, but are not limited to, linear feedback shift registers, random cycle bit generators, and squares random number generators.


In some embodiments, the random number provided by the random number generator circuit 352 may be provided as an output random number RAN to a combining circuit 356. The combining circuit 356 may further receive a fixed value FIX from the fixed value storage circuit 354. In some embodiments, the combining circuit 356 may combine the random number RAN and the fixed value FIX to provide the threshold value TV. The threshold value TV may be provided to the threshold comparator circuit from the combining circuit 356 rather than from the random number generator circuit 352. In some embodiments, the combining circuit 356 may sum RAN and FIX to provide TV. In some embodiments, the combining circuit 356 may take an average of RAN and FIX to provide TV. In some embodiments, the combining circuit 356 may multiply RAN and FIX to provide TV. The circuitry for performing such arithmetic operations are well known in the art and will not be provided herein.


The fixed value storage circuit 354 may be any suitable storage circuit for storing a fixed value of a desired magnitude. Suitable circuits include, but are not limited to, latches and registers. The fixed value FIX may be set (e.g., hardwiring, fuse blowing, anti-fuses) or programmable (e.g., programmable latch or register, such as mode register 128) in the fixed value storage circuit 354. The numbers and ranges selected for the random number RAN and fixed value FIX may be based on one or more factors such as word line density, system criticality, and/or materials used in a memory device.



FIG. 4 is a flow chart of a method according to an embodiment of the present disclosure. In some embodiments, the method 400 may be performed in whole or in part by a refresh control circuit, such as refresh control circuit 116 and/or 216. While the method 400 will be described with reference to refresh control circuit 216, the method 400 is not limited to the specific refresh control circuit shown in FIG. 2.


At block 402, “generating a threshold value based, at least in part, on a random number” may be performed. In some embodiments, the threshold value may be generated by threshold generator circuit 232 and/or 332. In some embodiments, generating the threshold value may include generating a random number and combining the random number with a fixed value. The random number may be generated by a random number generator circuit, such as random number generator circuit 352. In some embodiments, the fixed value may be stored in a storage circuit, such as fixed value storage circuit 354. However, in some embodiments, only the random number is generated and the fixed value is omitted. In some embodiments, the random number may be generated responsive to, at least in part, receipt of an activation command ACT. Optionally, in some embodiments, method 400 may further include programming at least one of a range, a standard deviation, or a mean of the random number, for example, by writing to a mode register.


At block 404, “comparing an access count value for a word line of a memory array to the threshold value” may be performed. The access count value may correspond to a number of times the word line has been accessed. The access count value may be received from a counter circuit, such as counter circuit 228, which may have received the information from counter memory cells, such as counter memory cells 126 and/or 226, located along word lines of a memory array, such as memory array 118. The comparing may be performed by a threshold comparator circuit, such as threshold comparator circuit 230.


Based on the comparing, at block 406, “activating a trigger signal” may be performed. In some embodiments, the threshold comparator circuit may activate the trigger signal, such as TRIG. In some embodiments, the trigger signal may be received by the counter circuit, an aggressor row address register circuit, such as aggressor address register circuit 244, and/or an RHR state control circuit, such as RHR state control circuit 342.


At block 408, “latching a row address of the word line when the trigger signal is activated” may be performed. In some embodiments, this may be performed by the aggressor row address register circuit. In some embodiments, method 400 may further include calculating at least one victim row address based, at least in part, on the row address latched by the aggressor row address register circuit. In some embodiments, this may be performed by a refresh address generator, such as refresh address generator 350. In some embodiments, method 400 may further include performing targeted refresh operations on at least one word line corresponding to the at least one victim row address. The refresh operations may be performed, at least in part, by a row decoder, such as row decoder 108 and/or 308.


Optionally, as shown in block 410, method 400 may include, “asserting a signal on an external pin of a memory device when the trigger signal is activated.” In some embodiments, the signal may be asserted by the RHR state control circuit. In some embodiments, the external pin may be a ready-wait pin and/or an alert pin. The signal on the pin may be provided to a device external to the memory, such as memory controller 101.


While the use of a random threshold value has been described herein with reference to memory devices where accesses of all word lines are tracked for purposes of determining aggressor word lines, random threshold values as disclosed herein may be used with memory devices that use sampling techniques for determining aggressor rows such as those described in U.S. Pat. No. 11,043,254 and U.S. patent application Ser. No. 16/428,625, which are incorporated herein by reference for any purpose.



FIG. 5 is an example aggressor row detector circuit according to an embodiment of the present disclosure. In some embodiments, aggressor row detector circuit 500 may be included in memory devices that use sampling techniques to determine aggressor rows rather than including counter memory cells with word lines of the memory array. In some embodiments, the aggressor row detector circuit 500 may replace the aggressor address register 244 shown in FIG. 2.


The aggressor row detector circuit 500 may include a stack 501. The stack 501 may be a content addressable memory (CAM) stack in some embodiments. The stack 501 may include multiple registers (e.g., files) 502, each of which may have corresponding fields 504, 506. In the embodiment shown in FIG. 5, each register includes a field 504 configured to store a row address (RowADD0-7) and a field 506 configured to store a corresponding count value (ACntVal0-7). In some embodiments, the fields 506 may replace the counter circuit 228. The fields 506 storing the count values may be coupled to a comparator 508 which may be coupled to pointers 512 through a counter scrambler 510. In some embodiments, the fields 504 storing row addresses may be coupled to one or more refresh address generators, such as refresh address generator 250 in FIG. 2, and provide a matched address HitXADD to the refresh address generator. While the example in FIG. 5 shows eight registers 502 in the stack 501, it is understood that the stack could include fewer or more registers. For example, the stack 501 could have 128 registers. In another example, the stack 501 could have 1,024 registers.


Each time a row address XADD is provided to the registers 502, the row address XADD may be compared to the fields 504. If the current row address XADD is already stored in one of the registers 502, then the count value in field 506 associated with the matching row address in field 504 may be adjusted (e.g., increased). If the current row address XADD is not already stored in one of the registers 502, it may be added to the registers 502. If there is an open register (e.g., a register without a row address) then the row address XADD may be stored in the open register. If there is not an open register, then the register 502 associated with the count value which has the lowest value (as indicated by the pointers 512) may have its row address replaced with the current row address XADD and count value reset.


The comparator 508 may compare the count values in fields 506 to a threshold value to determine if a count value for a row address has matched or exceeded the threshold value. In some embodiments, the comparator 508 may replace threshold comparator circuit 230. According to embodiments of the present disclosure, the threshold value may be provided by a threshold generator circuit 532. In some embodiments, the threshold generator circuit 532 may be implemented by threshold generator circuit 232 and/or 332. In some embodiments, the comparator 508 may further compare the count values to determine which row address is associated with the lowest count value. The fields 506 corresponding to the minimum count value and count values that meet or exceed the threshold value may be provided to a counter scrambler 510, which may match the above threshold value fields and minimum count value field to their respective associated row address fields 504. The pointers 512 may point to the row addresses in fields 504 associated with count values at or above the threshold value and may point to the fields 504 associated with the minimum count value in fields 506. The threshold value pointer(s) may be used to reset the counts of the row addresses determined to be aggressors. In some embodiments, the threshold value pointer(s) may be used to provide the corresponding row addresses) to the victim address generators as HitXADD. The minimum count value pointer may be used to overwrite a register 502 when a new row address XADD is received and there is no open register 502 to store it in.


If the threshold value used by the comparator 508 was static, an attack could possibly drive the count values for all of the fields 506 up to near the threshold value, then quickly access all of the addresses stored in the fields 504 simultaneously or near simultaneously. This could cause the comparator 508 to trigger all of the addresses in the fields 504 to be provided as HitXADD simultaneously or in a short period of time. This could cause malfunctions downstream (e.g., overload the refresh address generator 250). However, by randomly generating the threshold value each time with the threshold generator circuit 532, the risk may be reduced for similar reasons as those described with reference to FIG. 2.


The systems, methods, and apparatuses may provide dynamic thresholds for detecting aggressor rows. Comparing a number of accesses of a row to a dynamic threshold may reduce the occurrence of several word lines being detected as aggressors in a short period of time. Thus, the length of time the memory device is unavailable due to performing targeted refresh operations may remain within an acceptable time period and/or memory errors due to a high number of aggressor rows may be reduced.


It is to be appreciated that any one of the examples, embodiments or processes described herein may be combined with one or more other examples, embodiments and/or processes or be separated and/or performed amongst separate devices or device portions in accordance with the present systems, devices and methods.


Finally, the above-discussion is intended to be merely illustrative of the present system and should not be construed as limiting the appended claims to any particular embodiment or group of embodiments. Thus, while the present system has been described in particular detail with reference to exemplary embodiments, it should also be appreciated that numerous modifications and alternative embodiments may be devised by those having ordinary skill in the art without departing from the broader and intended spirit and scope of the present system as set forth in the claims that follow. Accordingly, the specification and drawings are to be regarded in an illustrative manner and are not intended to limit the scope of the appended claims.

Claims
  • 1. An apparatus comprising: a counter circuit coupled to a memory array, the counter circuit configured to determine an access count value of a word line of the memory array based on values stored in count value memory cells of the word line, wherein the access count value indicates a number of times the word line has been accessed;a threshold generator circuit configured to provide a threshold value comprising a random number provided by a random number generator of the threshold generator circuit; anda comparator circuit coupled to the counter circuit and the threshold generator circuit, the comparator circuit configured to compare the access count value to the threshold value and, based on the comparison, activate a trigger signal.
  • 2. The apparatus of claim 1, further comprising an aggressor row address register configured to receive the trigger signal and latch a row address of the word line when the trigger signal is in an active state.
  • 3. The apparatus of claim 1, wherein the threshold generator circuit further comprises: a storage circuit configured to provide a fixed value; anda combining circuit configured to combine the fixed value and the random number to provide the threshold value.
  • 4. The apparatus of claim 1, wherein the random number generator comprises a linear feedback shift register.
  • 5. The apparatus of claim 1, wherein the random number generator is configured to generate the random number within a range.
  • 6. The apparatus of claim 5, further comprising a mode register, wherein the range is stored in the mode register.
  • 7. The apparatus of claim 1, further comprising a state control circuit configured to receive the trigger signal, wherein the state control circuit is configured to cause a targeted refresh operation to be performed on at least one victim word line of the word line when the trigger signal is in an active state.
  • 8. The apparatus of claim 7, further comprising an external pin, wherein the state control circuit is further configured to assert a busy signal on the external pin when the trigger signal is in the active state.
  • 9. A method comprising: generating a threshold value based, at least in part, on a random number;comparing an access count value for a word line of a memory array to the threshold value, wherein the access count value corresponds to a number of times the word line has been accessed;based on the comparing, activating a trigger signal; andlatching a row address of the word line when the trigger signal is activated.
  • 10. The method of claim 9, wherein generating the threshold value comprises: generating the random number; andcombining the random number and a fixed value.
  • 11. The method of claim 10, wherein combining the random number and the fixed value comprises summing the random number and the fixed value.
  • 12. The method of claim 10, further comprising programming at least one of a range, a standard deviation, or a mean of the random number.
  • 13. The method of claim 10, further comprising receiving an activation command, wherein the random number is generated responsive to the activation command.
  • 14. The method of claim 9, further comprising: calculating at least one victim row address based, at least in part, on the row address; andperforming targeted refresh operations on at least one word line corresponding to the at least one victim row address.
  • 15. The method of claim 9, further comprising asserting a busy signal on an external pin of a memory device when the trigger signal is activated.
US Referenced Citations (449)
Number Name Date Kind
1158364 Bibb Oct 1915 A
3633175 Harper Jan 1972 A
5291198 Dingwall et al. Mar 1994 A
5299159 Balistreri et al. Mar 1994 A
5422850 Sukegawa et al. Jun 1995 A
5638317 Tran Jun 1997 A
5699297 Yamazaki Dec 1997 A
5768196 Bloker Jun 1998 A
5933377 Hidaka Aug 1999 A
5943283 Wong et al. Aug 1999 A
5970507 Kato et al. Oct 1999 A
5999471 Choi Dec 1999 A
6002629 Kim et al. Dec 1999 A
6011734 Pappert Jan 2000 A
6061290 Shirley May 2000 A
6212118 Fujita Apr 2001 B1
6310806 Higashi et al. Oct 2001 B1
6317381 Gans et al. Nov 2001 B1
6373738 Towler et al. Apr 2002 B1
6392952 Chen et al. May 2002 B1
6424582 Ooishi Jul 2002 B1
6434064 Nagai Aug 2002 B2
6452868 Fister Sep 2002 B1
6480931 Buti et al. Nov 2002 B1
6515928 Sato et al. Feb 2003 B2
6567340 Natarai et al. May 2003 B1
6950364 Kim Sep 2005 B2
7027343 Sinha et al. Apr 2006 B2
7057960 Fiscus et al. Jun 2006 B1
7082070 Hong Jul 2006 B2
7187607 Koshikawa et al. Mar 2007 B2
7203113 Takahashi et al. Apr 2007 B2
7203115 Eto et al. Apr 2007 B2
7209402 Shinozaki et al. Apr 2007 B2
7215588 Lee May 2007 B2
7283380 Srinivasan et al. Oct 2007 B1
7304875 Lien et al. Dec 2007 B1
7319602 Srinivasan et al. Jan 2008 B1
7444577 Best et al. Oct 2008 B2
7551502 Dono et al. Jun 2009 B2
7565479 Best Jul 2009 B2
7830742 Han Nov 2010 B2
7870362 Hong et al. Jan 2011 B2
7872907 Okayama et al. Jan 2011 B2
8174921 Kim et al. May 2012 B2
8400805 Yoko Mar 2013 B2
8451677 Okahiro et al. May 2013 B2
8625360 Iwamoto et al. Jan 2014 B2
8676725 Lin et al. Mar 2014 B1
8681578 Narui Mar 2014 B2
8756368 Best et al. Jun 2014 B2
8811100 Ku Aug 2014 B2
8862973 Zimmerman et al. Oct 2014 B2
8938573 Greenfield et al. Jan 2015 B2
9032141 Bains et al. May 2015 B2
9047978 Bell et al. Jun 2015 B2
9058900 Kang Jun 2015 B2
9087554 Park Jul 2015 B1
9087602 Youn et al. Jul 2015 B2
9117544 Bains et al. Aug 2015 B2
9123447 Lee Sep 2015 B2
9153294 Kang Oct 2015 B2
9190137 Kim et al. Nov 2015 B2
9190139 Jung et al. Nov 2015 B2
9251885 Greenfield et al. Feb 2016 B2
9286964 Halbert et al. Mar 2016 B2
9299457 Chun et al. Mar 2016 B2
9311985 Lee et al. Apr 2016 B2
9324398 Jones et al. Apr 2016 B2
9384821 Bains et al. Jul 2016 B2
9390782 Best et al. Jul 2016 B2
9412432 Narui et al. Aug 2016 B2
9424907 Fujishiro Aug 2016 B2
9484079 Lee Nov 2016 B2
9514850 Kim Dec 2016 B2
9570143 Lim et al. Feb 2017 B2
9646672 Kim et al. May 2017 B1
9672889 Lee et al. Jun 2017 B2
9685240 Park Jun 2017 B1
9691466 Kim Jun 2017 B1
9697913 Mariani et al. Jul 2017 B1
9734887 Tavva Aug 2017 B1
9741409 Jones et al. Aug 2017 B2
9741447 Akamatsu Aug 2017 B2
9747971 Bains et al. Aug 2017 B2
9761297 Tomishima Sep 2017 B1
9786351 Lee et al. Oct 2017 B2
9799391 Wei Oct 2017 B1
9805782 Liou Oct 2017 B1
9805783 Ito et al. Oct 2017 B2
9818469 Kim et al. Nov 2017 B1
9847118 Won Dec 2017 B1
9865326 Bains et al. Jan 2018 B2
9865328 Desimone et al. Jan 2018 B1
9922694 Akamatsu Mar 2018 B2
9934143 Bains et al. Apr 2018 B2
9953696 Kim Apr 2018 B2
10032501 Ito Jul 2018 B2
10083737 Bains et al. Sep 2018 B2
10090038 Shin Oct 2018 B2
10134461 Bell et al. Nov 2018 B2
10147472 Jones et al. Dec 2018 B2
10153031 Akamatsu Dec 2018 B2
10170174 Ito et al. Jan 2019 B1
10176860 Mylavarapu Jan 2019 B1
10210925 Bains et al. Feb 2019 B2
10297305 Moon et al. May 2019 B1
10339994 Ito et al. Jul 2019 B2
10381327 Ramachandra et al. Aug 2019 B2
10387276 Ryu Aug 2019 B2
10446216 Oh et al. Oct 2019 B2
10490251 Wolff Nov 2019 B2
10600462 Augustine et al. Mar 2020 B2
10600491 Chou et al. Mar 2020 B2
10607686 Akamatsu Mar 2020 B2
10629286 Lee et al. Apr 2020 B2
10679710 Hirashima et al. Jun 2020 B2
10705900 Jin Jul 2020 B2
10770127 Shore et al. Sep 2020 B2
10811066 Jones et al. Oct 2020 B2
10832792 Penney et al. Nov 2020 B1
10861519 Jones et al. Dec 2020 B2
10867660 Akamatsu Dec 2020 B2
10930335 Bell et al. Feb 2021 B2
10943636 Wu et al. Mar 2021 B1
10950289 Ito et al. Mar 2021 B2
10964378 Ayyapureddi et al. Mar 2021 B2
11011215 Parry et al. May 2021 B1
11043254 Enomoto et al. Jun 2021 B2
11139015 Brown et al. Oct 2021 B2
11152050 Morohashi et al. Oct 2021 B2
11158364 Penney et al. Oct 2021 B2
11158373 Penney et al. Oct 2021 B2
11200942 Jenkinson et al. Dec 2021 B2
11222682 Enomoto et al. Jan 2022 B1
11257535 Shore et al. Feb 2022 B2
11264096 Schreck et al. Mar 2022 B2
11322192 Morohashi et al. May 2022 B2
11361808 Bell et al. Jun 2022 B2
11386946 Ayyapureddi et al. Jul 2022 B2
11398265 Wu et al. Jul 2022 B2
11424005 Penney et al. Aug 2022 B2
11462291 Pan Oct 2022 B2
11482275 Ayyapureddi et al. Oct 2022 B2
11521669 Enomoto et al. Dec 2022 B2
11568918 Ayyapureddi et al. Jan 2023 B2
20010008498 Ooishi Jul 2001 A1
20020007476 Kishino Jan 2002 A1
20020078311 Matsuzaki et al. Jun 2002 A1
20020080677 Watanabe et al. Jun 2002 A1
20020181301 Takahashi et al. Dec 2002 A1
20030063512 Takahashi et al. Apr 2003 A1
20030067825 Shimano et al. Apr 2003 A1
20030090400 Barker May 2003 A1
20030123301 Jang et al. Jul 2003 A1
20030193829 Morgan et al. Oct 2003 A1
20030231540 Lazar et al. Dec 2003 A1
20040004856 Sakimura et al. Jan 2004 A1
20040008544 Shinozaki Jan 2004 A1
20040022093 Lee Feb 2004 A1
20040052142 Ikehashi et al. Mar 2004 A1
20040114446 Takahashi et al. Jun 2004 A1
20040130959 Kawaguchi Jul 2004 A1
20040174757 Garverick et al. Sep 2004 A1
20040184323 Mori et al. Sep 2004 A1
20040213035 Cavaleri et al. Oct 2004 A1
20040218431 Chung et al. Nov 2004 A1
20050041502 Perner Feb 2005 A1
20050105315 Shin et al. May 2005 A1
20050243629 Lee Nov 2005 A1
20050265104 Remaklus et al. Dec 2005 A1
20060083099 Bae et al. Apr 2006 A1
20060087903 Riho et al. Apr 2006 A1
20060176744 Stave Aug 2006 A1
20060262616 Chen Nov 2006 A1
20070008799 Dono et al. Jan 2007 A1
20070014174 Ohsawa Jan 2007 A1
20070028068 Golding et al. Feb 2007 A1
20070030746 Best et al. Feb 2007 A1
20070033339 Best et al. Feb 2007 A1
20070133330 Ohsawa Jun 2007 A1
20070230264 Eto Oct 2007 A1
20070237016 Miyamoto et al. Oct 2007 A1
20070297252 Singh Dec 2007 A1
20080028260 Oyagi et al. Jan 2008 A1
20080031068 Yoo et al. Feb 2008 A1
20080062742 Wang Mar 2008 A1
20080126893 Harrand et al. May 2008 A1
20080130394 Dono et al. Jun 2008 A1
20080181048 Han Jul 2008 A1
20080224742 Pomichter Sep 2008 A1
20080253212 Iida et al. Oct 2008 A1
20080266990 Loeffler Oct 2008 A1
20080288720 Atwal et al. Nov 2008 A1
20080301362 Cavanna et al. Dec 2008 A1
20080313494 Hummler et al. Dec 2008 A1
20080316845 Wang et al. Dec 2008 A1
20090021999 Tanimura Jan 2009 A1
20090059641 Jeddeloh Mar 2009 A1
20090077571 Gara et al. Mar 2009 A1
20090161457 Wakimoto Jun 2009 A1
20090168571 Pyo et al. Jul 2009 A1
20090185440 Lee Jul 2009 A1
20090201752 Riho et al. Aug 2009 A1
20090213675 Shino Aug 2009 A1
20090251971 Futatsuyama Oct 2009 A1
20090296510 Lee et al. Dec 2009 A1
20100005217 Jeddeloh Jan 2010 A1
20100005376 Laberge et al. Jan 2010 A1
20100054011 Kim Mar 2010 A1
20100074042 Fukuda et al. Mar 2010 A1
20100080074 Ohmaru et al. Apr 2010 A1
20100110809 Kobayashi et al. May 2010 A1
20100110810 Kobayashi May 2010 A1
20100131812 Mohammad May 2010 A1
20100157693 Iwai et al. Jun 2010 A1
20100182863 Fukiage Jul 2010 A1
20100329069 Ito et al. Dec 2010 A1
20110026290 Noda et al. Feb 2011 A1
20110051530 Kushida Mar 2011 A1
20110055495 Remaklus, Jr. et al. Mar 2011 A1
20110069572 Lee et al. Mar 2011 A1
20110122987 Neyer May 2011 A1
20110216614 Hosoe Sep 2011 A1
20110225355 Kajigaya Sep 2011 A1
20110286271 Chen Nov 2011 A1
20110310648 Iwamoto et al. Dec 2011 A1
20110317462 Gyllenhammer et al. Dec 2011 A1
20120014199 Narui Jan 2012 A1
20120059984 Kang et al. Mar 2012 A1
20120151131 Kilmer et al. Jun 2012 A1
20120213021 Riho et al. Aug 2012 A1
20120254472 Ware et al. Oct 2012 A1
20130003467 Klein Jan 2013 A1
20130003477 Park et al. Jan 2013 A1
20130057173 Yao et al. Mar 2013 A1
20130107623 Kavalipurapu et al. May 2013 A1
20130173971 Zimmerman Jul 2013 A1
20130254475 Perego et al. Sep 2013 A1
20130279284 Jeong Oct 2013 A1
20130304982 Jung et al. Nov 2013 A1
20140006703 Bains et al. Jan 2014 A1
20140006704 Greenfield et al. Jan 2014 A1
20140013169 Kobla et al. Jan 2014 A1
20140013185 Kobla et al. Jan 2014 A1
20140050004 Mochida Feb 2014 A1
20140078841 Chopra Mar 2014 A1
20140078842 Oh et al. Mar 2014 A1
20140078845 Song Mar 2014 A1
20140089576 Bains et al. Mar 2014 A1
20140095780 Bains et al. Apr 2014 A1
20140095786 Moon et al. Apr 2014 A1
20140119091 You May 2014 A1
20140136763 Li et al. May 2014 A1
20140143473 Kim et al. May 2014 A1
20140177370 Halbert Jun 2014 A1
20140177376 Song Jun 2014 A1
20140189215 Kang et al. Jul 2014 A1
20140189228 Greenfield et al. Jul 2014 A1
20140219043 Jones et al. Aug 2014 A1
20140237307 Kobla et al. Aug 2014 A1
20140241099 Seo et al. Aug 2014 A1
20140254298 Dally Sep 2014 A1
20140269021 Yang et al. Sep 2014 A1
20140281206 Crawford et al. Sep 2014 A1
20140281207 Mandava et al. Sep 2014 A1
20140292375 Angelini et al. Oct 2014 A1
20140293725 Best et al. Oct 2014 A1
20140317344 Kim Oct 2014 A1
20140355332 Youn et al. Dec 2014 A1
20140369109 Lee et al. Dec 2014 A1
20140379978 Kim et al. Dec 2014 A1
20150049567 Chi Feb 2015 A1
20150055420 Bell et al. Feb 2015 A1
20150078112 Huang Mar 2015 A1
20150089326 Joo et al. Mar 2015 A1
20150155027 Abe et al. Jun 2015 A1
20150162067 Kim et al. Jun 2015 A1
20150170728 Jung et al. Jun 2015 A1
20150199126 Jayasena et al. Jul 2015 A1
20150206572 Lim et al. Jul 2015 A1
20150213872 Mazumder et al. Jul 2015 A1
20150213877 Darel Jul 2015 A1
20150228341 Watanabe et al. Aug 2015 A1
20150243339 Bell et al. Aug 2015 A1
20150255140 Song Sep 2015 A1
20150262652 Igarashi Sep 2015 A1
20150279441 Greenberg et al. Oct 2015 A1
20150279442 Hwang Oct 2015 A1
20150294711 Gaither et al. Oct 2015 A1
20150340077 Akamatsu Nov 2015 A1
20150356048 King Dec 2015 A1
20160019940 Jang et al. Jan 2016 A1
20160027498 Ware et al. Jan 2016 A1
20160027531 Jones et al. Jan 2016 A1
20160027532 Kim Jan 2016 A1
20160042782 Narui et al. Feb 2016 A1
20160078845 Lin Mar 2016 A1
20160078911 Fujiwara et al. Mar 2016 A1
20160078918 Hyun et al. Mar 2016 A1
20160086649 Hong et al. Mar 2016 A1
20160086651 Kim Mar 2016 A1
20160093402 Kitagawa et al. Mar 2016 A1
20160099043 Tu Apr 2016 A1
20160111140 Joo et al. Apr 2016 A1
20160125931 Doo et al. May 2016 A1
20160133314 Hwang et al. May 2016 A1
20160140243 Adams et al. May 2016 A1
20160163372 Lee Jun 2016 A1
20160172056 Huh Jun 2016 A1
20160180917 Chishti et al. Jun 2016 A1
20160180921 Jeong Jun 2016 A1
20160196863 Shin et al. Jul 2016 A1
20160202926 Benedict Jul 2016 A1
20160211008 Benedict et al. Jul 2016 A1
20160224262 Mandava et al. Aug 2016 A1
20160225433 Bains et al. Aug 2016 A1
20160225461 Tuers et al. Aug 2016 A1
20160336060 Shin Nov 2016 A1
20160343423 Shido Nov 2016 A1
20170011792 Oh et al. Jan 2017 A1
20170076779 Bains et al. Mar 2017 A1
20170092350 Halbert et al. Mar 2017 A1
20170117030 Fisch et al. Apr 2017 A1
20170133085 Kim et al. May 2017 A1
20170139641 Cha et al. May 2017 A1
20170140611 Joo May 2017 A1
20170140807 Sun et al. May 2017 A1
20170148504 Saifuddin et al. May 2017 A1
20170177246 Miller et al. Jun 2017 A1
20170186481 Oh et al. Jun 2017 A1
20170213586 Kang et al. Jul 2017 A1
20170221546 Loh et al. Aug 2017 A1
20170263305 Cho Sep 2017 A1
20170287547 Ito et al. Oct 2017 A1
20170323675 Jones Nov 2017 A1
20170352399 Yokoyama et al. Dec 2017 A1
20170371742 Shim et al. Dec 2017 A1
20170372767 Kang et al. Dec 2017 A1
20180005690 Morgan Jan 2018 A1
20180025770 Ito et al. Jan 2018 A1
20180025772 Lee et al. Jan 2018 A1
20180060194 Ryu et al. Mar 2018 A1
20180061483 Morgan Mar 2018 A1
20180082737 Lee Mar 2018 A1
20180084314 Koyama Mar 2018 A1
20180090199 Kim Mar 2018 A1
20180096719 Tomishima Apr 2018 A1
20180102776 Chandrasekar et al. Apr 2018 A1
20180107417 Shechter et al. Apr 2018 A1
20180114561 Fisch et al. Apr 2018 A1
20180114565 Lee Apr 2018 A1
20180158504 Akamatsu Jun 2018 A1
20180182445 Lee et al. Jun 2018 A1
20180203621 Ahn et al. Jul 2018 A1
20180218767 Wolff Aug 2018 A1
20180261268 Hyun et al. Sep 2018 A1
20180294028 Lee et al. Oct 2018 A1
20180308539 Ito et al. Oct 2018 A1
20180341553 Koudele et al. Nov 2018 A1
20180366182 Hyun et al. Dec 2018 A1
20190013059 Akamatsu Jan 2019 A1
20190043558 Suh et al. Feb 2019 A1
20190051344 Bell et al. Feb 2019 A1
20190066759 Nale Feb 2019 A1
20190066762 Koya Feb 2019 A1
20190088315 Saenz et al. Mar 2019 A1
20190088316 Inuzuka et al. Mar 2019 A1
20190096492 Cai et al. Mar 2019 A1
20190103147 Jones et al. Apr 2019 A1
20190130961 Bell et al. May 2019 A1
20190139599 Ito et al. May 2019 A1
20190147941 Qin et al. May 2019 A1
20190147964 Yun et al. May 2019 A1
20190161341 Howe May 2019 A1
20190172518 Chen et al. Jun 2019 A1
20190196730 Imran Jun 2019 A1
20190198078 Hoang et al. Jun 2019 A1
20190198090 Lee Jun 2019 A1
20190198099 Mirichigni et al. Jun 2019 A1
20190205253 Roberts Jul 2019 A1
20190207736 Ben-tovim et al. Jul 2019 A1
20190228810 Jones et al. Jul 2019 A1
20190228813 Nale et al. Jul 2019 A1
20190228815 Morohashi et al. Jul 2019 A1
20190237132 Morohashi Aug 2019 A1
20190243708 Cha et al. Aug 2019 A1
20190252020 Rios et al. Aug 2019 A1
20190267077 Ito et al. Aug 2019 A1
20190279706 Kim Sep 2019 A1
20190333573 Shin et al. Oct 2019 A1
20190348100 Smith et al. Nov 2019 A1
20190348102 Smith et al. Nov 2019 A1
20190348103 Jeong et al. Nov 2019 A1
20190348107 Shin et al. Nov 2019 A1
20190349545 Koh et al. Nov 2019 A1
20190362774 Kuramori et al. Nov 2019 A1
20190371391 Cha et al. Dec 2019 A1
20190385661 Koo et al. Dec 2019 A1
20190385667 Morohashi et al. Dec 2019 A1
20190386557 Wang et al. Dec 2019 A1
20200005857 Ito et al. Jan 2020 A1
20200075106 Tokutomi et al. Mar 2020 A1
20200082873 Wolff Mar 2020 A1
20200090760 Purahmad et al. Mar 2020 A1
20200135263 Brown et al. Apr 2020 A1
20200194050 Akamatsu Jun 2020 A1
20200194056 Sakurai et al. Jun 2020 A1
20200201380 Murali et al. Jun 2020 A1
20200202921 Morohashi et al. Jun 2020 A1
20200211626 Hiscock et al. Jul 2020 A1
20200211633 Okuma Jul 2020 A1
20200211636 Hiscock et al. Jul 2020 A1
20200251158 Shore et al. Aug 2020 A1
20200294576 Brown et al. Sep 2020 A1
20200302994 Enomoto et al. Sep 2020 A1
20200321049 Meier et al. Oct 2020 A1
20200349995 Shore Nov 2020 A1
20200365208 Schreck et al. Nov 2020 A1
20200381040 Penney et al. Dec 2020 A1
20200395072 Penney et al. Dec 2020 A1
20210005229 Hiscock et al. Jan 2021 A1
20210005240 Brown et al. Jan 2021 A1
20210020223 Ayyapureddi et al. Jan 2021 A1
20210020262 Penney et al. Jan 2021 A1
20210026732 Park et al. Jan 2021 A1
20210057012 Ayyapureddi et al. Feb 2021 A1
20210057013 Jenkinson et al. Feb 2021 A1
20210057021 Wu et al. Feb 2021 A1
20210065755 Kim et al. Mar 2021 A1
20210065764 Cheng et al. Mar 2021 A1
20210142852 Schreck et al. May 2021 A1
20210158851 Ayyapureddi May 2021 A1
20210158860 Wu et al. May 2021 A1
20210158861 Jeong et al. May 2021 A1
20210201984 Khasawneh et al. Jul 2021 A1
20210225432 Enomoto et al. Jul 2021 A1
20210241810 Hollis et al. Aug 2021 A1
20210265504 Ishizu et al. Aug 2021 A1
20210343324 Brown et al. Nov 2021 A1
20210350844 Morohashi et al. Nov 2021 A1
20210398592 Penney et al. Dec 2021 A1
20210407583 Penney et al. Dec 2021 A1
20220069992 Ayyapureddi Mar 2022 A1
20220165347 Pan May 2022 A1
20220230672 Ayyapureddi et al. Jul 2022 A1
20220293166 Ayyapureddi et al. Sep 2022 A1
20220415427 Pan Dec 2022 A1
20230010619 Ayyapureddi et al. Jan 2023 A1
Foreign Referenced Citations (31)
Number Date Country
1144434 Mar 1997 CN
1195173 Oct 1998 CN
101038785 Sep 2007 CN
101067972 Nov 2007 CN
101331554 Dec 2008 CN
101458658 Jun 2009 CN
101622607 Jan 2010 CN
102113058 Jun 2011 CN
102483952 May 2012 CN
104350546 Feb 2015 CN
106710621 May 2017 CN
107871516 Apr 2018 CN
H0773682 Mar 1995 JP
2005-216429 Aug 2005 JP
2011-258259 Dec 2011 JP
4911510 Jan 2012 JP
2013-004158 Jan 2013 JP
20150002112 Jan 2015 KR
20150002783 Jan 2015 KR
20170058022 May 2017 KR
1020180064940 Jun 2018 KR
1020180085184 Jul 2018 KR
20190048049 May 2019 KR
2014120477 Aug 2014 WO
2015030991 Mar 2015 WO
2017171927 Oct 2017 WO
2019222960 Nov 2019 WO
2020010010 Jan 2020 WO
2020191222 Sep 2020 WO
2021003085 Jan 2021 WO
2022108808 May 2022 WO
Non-Patent Literature Citations (87)
Entry
US 11,264,075 B2, 03/2022, Bell et al. (withdrawn)
U.S. Appl. No. 17/932,206, titled, “Apparatuses and Methods for Dynamically Allocated Aggressor Detection”, filed Sep. 14, 2022; pp. all pages of application as filed.
U.S. Appl. No. 17/822,033, titled, “Apparatuses and Methods for Tracking Word Line Accesses”, filed Aug. 24, 2022, pp. all pages of application as filed.
U.S. Appl. No. 17/456,849 titled “Apparatuses, Systems, and Methods for Main Sketch and Slim Sketch Circuitfor Row Address Tracking”, filed Nov. 29, 2021.
U.S. Appl. No. 17/565,119 titled “Apparatuses and Methods for Row Hammer Counter Mat”, filed, Dec. 29, 2021.
U.S. Appl. No. 17/565,187 titled “Apparatuses and Methods for Row Hammer Counter Mat”, filed Dec. 29, 2021.
U.S. Appl. No. 17/446,710 titled “Apparatuses, Systems and Methods for Determining Extremum Numericalvalues”, filed Sep. 1, 2021.
U.S. Appl. No. 17/470,883 titled “Apparatuses and Methods for Tracking Victim Rows”, filed Sep. 9, 2021.
Application No. PCT/US20/23689, titled “Semiconductor Device Having Cam That Stores Address Signals”, dated Mar. 19, 2020, pp. all.
U.S. Appl. No. 15/884,192 entitled ‘Semiconductor Device Performing Row Hammer Refresh Operation’, filed Jan. 30, 2018, pp. all.
U.S. Appl. No. 16/797,658, titles “Apparatuses and Methods for Controlling Refresh Operations”, filed Feb. 21, 2020, pp. all.
U.S. Appl. No. 16/818,981 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, filed Mar. 13, 2020, pp. all.
U.S. Appl. No. 16/824,460, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Mar. 19, 2020, pp. all.
U.S. Appl. No. 16/025,844, titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, filed Jul. 2, 2018, pp. all.
U.S. Appl. No. 16/783,063, titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, dated Feb. 5, 2020, pp. all.
U.S. Appl. No. 16/805,197, titled “Apparatuses and Methods for Calculating Row Hammer Refresh Addresses in a Semiconductor Device”, dated Feb. 28, 2020, pp. all.
U.S. Appl. No. 16/232,837, titled “Apparatuses and Methods for Distributed Targeted Refresh Operations”, filed Dec. 26, 2018, pp. all.
U.S. Appl. No. 16/818,989, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Mar. 13, 2020, pp. all.
U.S. Appl. No. 16/268,818, titled “Apparatuses and Methods for Managing Row Access Counts”, filed Feb. 6, 2019, pp. all.
U.S. Appl. No. 16/286,187 titled “Apparatuses and Methods for Memory Mat Refresh Sequencing”, filed Feb. 26, 2019; pp. all.
U.S. Appl. No. 16/084,119, titled “Apparatuses and Methods for Pure-Time, Self Adopt Sampling for Row Hammer Refresh Sampling”, filed Sep. 11, 2018, pp. all.
U.S. Appl. No. 16/886,284 titled “Apparatuses and Methods for Access Based Refresh Timing”, filed May 28, 2020, pp. all.
U.S. Appl. No. 16/886,284, titled “Apparatuses and Methods for Access Based Refresh Timing”, dated May 28, 2020, pp. all.
U.S. Appl. No. 16/358,587, titled “Semiconductor Device Having Cam That Stores Address Signals”, dated Mar. 19, 2019, pp. all.
U.S. Appl. No. 16/375,716 titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, filed Apr. 4, 2019; pp. all.
U.S. Appl. No. 16/936,297 titled “Apparatuses and Methods for Managing Row Access Counts”, filed Jul. 22, 2020, pp. all.
U.S. Appl. No. 16/411,573 titled “Apparatuses, Systems, and Methods for a Content Addressable Memory Cell”, filed May 14, 2019, pp. all.
U.S. Appl. No. 16/428,625 titled “Apparatuses and Methods for Tracking Victim Rows”, filed May 31, 2019, pp. all.
U.S. Appl. No. 16/513,400 titled “Apparatuses and Methods for tracking Row Accesses”, filed Jul. 16, 2019, pp. all.
U.S. Appl. No. 17/060,403 titled “Apparatuses and Methods for Adjusting Victim Data”, filed Oct. 1, 2020, pp. all.
U.S. Appl. No. 16/548,027 titled “Apparatuses, Systems, and Methods for Analog Row Access Rate Determination”, filed Aug. 22, 2019, pp. all.
U.S. Appl. No. 16/549,942 titled “Apparatuses and Methods for Lossy Row Access Counting”, filed Aug. 23, 2019, pp. all.
U.S. Appl. No. 16/546,152 titled “Apparatuses and Methods for Analog Row Access Tracking”, filed Aug. 20, 2019, pp. all.
U.S. Appl. No. 16/549,411 titled “Apparatuses and Methods for Dynamic Refresh Allocation”, filed Aug. 23, 2019, pp. all.
U.S. Appl. No. 16/655,110 titled “Apparatuses and Methods for Dynamic Targeted Refresh Steals”, filed Oct. 16, 2019, pp. all.
U.S. Appl. No. 17/154,945 titled “Apparatuses, Systems, and Methods for a Content Addressable Memory Cell”, filed Jan. 21, 2021, pp. all.
U.S. Appl. No. 17/170,616 titled “Apparatuses, Systems, and Methods for Analog Row Access Rate Determination”, filed Feb. 8, 2021, pp. all.
U.S. Appl. No. 17/168,036 titled “Apparatuses and Methods for Analog Row Access Tracking”, filed Feb. 4, 2021, pp. all.
U.S. Appl. No. 17/301,533 titled “Semiconductor Device Having Cam That Stores Address Signals”, filed Apr. 6, 2021, pp. all.
International Application No. PCT/US19/40169 titled “Apparatus and Methods for Triggering Row Hammer Address Sampling”, filed Jul. 1, 2019, pp. all.
International Application No. PCT/US19/64028, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Dec. 2, 2019, pp. all.
International Application No. PCT/US20/26689, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, dated Apr. 3, 2020, pp. all.
International Application No. PCT/US20/40077, titled “Apparatuses and Methods for Monitoring Word Line Accesses”, dated Jun. 29, 2020, pp. all.
U.S. Appl. No. 16/788,657, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, dated Feb. 12, 2020, pp. all.
U.S. Appl. No. 15/881,256 entitled ‘Apparatuses and Methods for Detecting a Row Hammer Attack With a Bandpass Filter’, filed Jan. 26, 2018, pp. all.
U.S. Appl. No. 16/425,525 titled “Apparatuses And Methods for Tracking All Row Accesses”, filed May 29, 2019, pp. all.
U.S. Appl. No. 16/427,105 titled “Apparatuses And Methods for Priority Targeted Refresh Operations”, filed May 30, 2019, pp. all.
U.S. Appl. No. 16/427,140 titled “Apparatuses And Methods for Tracking Row Access Counts Between Multiple Register Stacks”, filed May 30, 2019, pp. all.
U.S. Appl. No. 16/437,811 titled “Apparatuses, Systems, And Methods for Determining Extremum Numerical Values”, filed Jun. 11, 2019, pp. all.
U.S. Appl. No. 16/537,981 titled “Apparatuses and Methods for Controlling Targeted Refresh Rates”, filed Aug. 12, 2019, pp. all.
U.S. Appl. No. 17/153,555 titled “Apparatuses and Methods for Dynamically Allocated Aggressor Detection”, filed Jan. 20, 2021, pp. all.
U.S. Appl. No. 17/201,941 titled “Apparatuses and Methods for Sketch Circuits for Refresh Binning”, filed Mar. 15, 2021, pp. all.
U.S. Appl. No. 17/375,817 titled “Apparatuses and Methods for Monitoring Word Line Accesses”, filed Jul. 14, 2021, pp. all.
U.S. Appl. No. 17/443,056 titled “Apparatuses and Methods for Multiple Row Hammer Refresh Address Sequences”, filed Jul. 20, 2021, pp. all.
U.S. Appl. No. 17/444,925 titled “Apparatuses and Methods for Countering Memory Attacks”, filed Aug. 12, 2021, pp. all.
U.S. Appl. No. 15/789,897, entitled “Apparatus and Methods for Refreshing Memory”, filed Oct. 20, 2017; pp. all.
U.S. Appl. No. 15/796,340, entitled: “Apparatus and Methods for Refreshing Memory”, filed Oct. 27, 2017; pp. all.
U.S. Appl. No. 16/012,679, titled “Apparatuses and Methods for Multiple Row Hammer Refresh Address Sequences”, filed Jun. 19, 2018; pp. all.
U.S. Appl. No. 16/112,471, titled “Semiconductor Device”, filed Jun. 27, 2018; pp. all.
U.S. Appl. No. 16/112,471 titled “Apparatuses and Methods for Controlling Refresh Operations”, filed Aug. 24, 2018; pp. all.
U.S. Appl. No. 16/160,801, titled “Apparatuses and Methods for Selective Row Refreshes”, filed Oct. 15, 2018, pp. all.
U.S. Appl. No. 16/176,932, titled “Apparatuses and Methods for Access Based Refresh Timing”, filed Oct. 31, 2018; pp. all.
U.S. Appl. No. 16/208,217, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Dec. 3, 2018, pp. all.
U.S. Appl. No. 16/230,300, titled “Apparatuses and Methods for Staggered Timing of Targeted Refresh Operations”, filed Dec. 21, 2018; pp. all.
U.S. Appl. No. 16/231,327 titled “Apparatuses and Methods for Selective Row Refreshes”, filed Dec. 21, 2018; pp. all.
U.S. Appl. No. 16/237,291, titled “Apparatus and Methods for Refreshing Memory”, filed Dec. 31, 2018, pp. all.
U.S. Appl. No. 16/290,730, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Mar. 1, 2019; pp. all.
U.S. Appl. No. 16/374,623, titled “Semiconductor Device Performing Row Hammer Refresh Operation”, filed Apr. 3, 2019; pp. ail.
U.S. Appl. No. 15/888,693 title “Semiconductor Device”, filed May 14, 2019; pp. all.
U.S. Appl. No. 16/427,330 titled “Apparatuses and Methods for Storing Victim Row Data”, filed May 30, 2019; pp. all.
U.S. Appl. No. 16/431,641 titled “Apparatuses and Methods for Controlling Steal Rates”, filed Jun. 4, 2019; pp. all.
U.S. Appl. No. 16/682,606, titled “Apparatuses and Methods for Distributing Row Hammer Refresh Events Across a Memory Device”, filed Nov. 13, 2019; pp. all.
U.S. Appl. No. 17/102,266, titled “Apparatuses and Methods for Tracking Word Line Accesses”, dated Nov. 23, 2020; pp. all.
U.S. Appl. No. 15/876,566 entitled ‘Apparatuses and Methods for Calculating Row Hammer Refresh Addresses in a Semiconductor Device’, filed Jan. 22, 2018; pp. all.
International Application No. PCT/US20/32684, titled “Apparatuses, Systems, and Methods for Content Addressable Memory Cell”, dated May 13, 2020; pp. all.
U.S. Appl. No. 15/656,084, titled “Apparatuses and Methods for Targeted Refreshing of Memory”, filed Jul. 21, 2017; pp. all.
U.S. Appl. No. 16/459,520 titled “Apparatuses and Methods for Monitoring Word Line Accesses”, filed Jul. 1, 2019, pp. all.
PCT Application No. PCT/US18/55821 “Apparatus and Methods for Refreshing Memory”, filed Oct. 15, 2018, pp. all.
U.S. Appl. No. 15/715,846, entitled “Semiconductor Device”, filed Sep. 26, 2017, pp. all.
U.S. Appl. No. 15/888,993, entitled “Apparatuses and Methods for Controlling Refresh Operations”, filed Feb. 5, 2018, pp. all.
U.S. Appl. No. 16/190,627 titled “Apparatuses and Methods for Targeted Refreshing of Memory”, filed Nov. 14, 2018, pp. all.
U.S. Appl. No. 16/459,507 titled “Apparatuses and Methods for Adjusting Victim Data”, filed Jul. 1, 2019, pp. all.
U.S. Appl. No. 15/281,818, entitled: “Semiconductor Device”, filed Sep. 30, 2016; pp. all.
U.S. Appl. No. 17/007,069, titled “Apparatuses and Methods for Providing Refresh Addresses”, filed Aug. 21, 2020; pp. all.
Kim, et al., “Flipping Bits in MemoryWithout Accessing Them: An Experimental Study of DRAM Disturbance Errors”, IEEE, Jun. 2014, 12 pgs.
Stout, Thomas et al., “Voltage Source Based Voltage-to-Time Converter”, IEEE, downloaded Jul. 2020, pg. All.
[English Abstract] Zheng, Bin , et al., “Design of Built-in DRAM for TFT-LCD Driver Chip” LCD and display, Issue 4, Aug. 15, 2009; pp. all.
Related Publications (1)
Number Date Country
20230047007 A1 Feb 2023 US