RIDL: Rogue in-flight data load
We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
constrained attacks to leak arbitrary data across address spaces and privilege boundaries …
On DRAM rowhammer and the physics of insecurity
AJ Walker, S Lee, D Beery - IEEE Transactions on Electron …, 2021 - ieeexplore.ieee.org
The dynamic random access memory (DRAM) disturb known as rowhammer (RH) has come
to dominate the insecurity of computing systems worldwide. Several studies have …
to dominate the insecurity of computing systems worldwide. Several studies have …
A modern primer on processing in memory
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …
design choice goes directly against at least three key trends in computing that cause …
TRRespass: Exploiting the many sides of target row refresh
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …
deliver what was meant to be the definitive hardware solution against the RowHammer …
Tbt: Targeted neural network attack with bit trojan
Abstract Security of modern Deep Neural Networks (DNNs) is under severe scrutiny as the
deployment of these models become widespread in many intelligence-based applications …
deployment of these models become widespread in many intelligence-based applications …
Rowhammer: A retrospective
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …
A survey of bit-flip attacks on deep neural network and corresponding defense methods
C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …
neural networks are widely used in many scenarios, including security-critical ones, which …
Rowpress: Amplifying read disturbance in modern dram chips
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories
Recent advancements in Deep Neural Networks (DNNs) have enabled widespread
deployment in multiple security-sensitive domains. The need for resource-intensive training …
deployment in multiple security-sensitive domains. The need for resource-intensive training …
Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques
RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in
2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows …
2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows …