Benchmarking a new paradigm: Experimental analysis and characterization of a real processing-in-memory system

J Gómez-Luna, I El Hajj, I Fernandez… - IEEE …, 2022 - ieeexplore.ieee.org
Many modern workloads, such as neural networks, databases, and graph processing, are
fundamentally memory-bound. For such workloads, the data movement between main …

A modern primer on processing in memory

O Mutlu, S Ghose, J Gómez-Luna… - … computing: from devices …, 2022 - Springer
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …

Rowpress: Amplifying read disturbance in modern dram chips

H Luo, A Olgun, AG Yağlıkçı, YC Tuğrul… - Proceedings of the 50th …, 2023 - dl.acm.org
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …

A survey of bit-flip attacks on deep neural network and corresponding defense methods

C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …

Deepsteal: Advanced model extractions leveraging efficient weight stealing in memories

AS Rakin, MHI Chowdhuryy, F Yao… - 2022 IEEE symposium …, 2022 - ieeexplore.ieee.org
Recent advancements in Deep Neural Networks (DNNs) have enabled widespread
deployment in multiple security-sensitive domains. The need for resource-intensive training …

Blacksmith: Scalable rowhammering in the frequency domain

P Jattke, V Van Der Veen, P Frigo… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We present the new class of non-uniform Rowhammer access patterns that bypass
undocumented, proprietary in-DRAM Target Row Refresh (TRR) while operating in a …

{ZenHammer}: Rowhammer Attacks on {AMD} Zen-based Platforms

P Jattke, M Wipfli, F Solt, M Marazzi… - 33rd USENIX Security …, 2024 - usenix.org
AMD has gained a significant market share in recent years with the introduction of the Zen
microarchitecture. While there are many recent Rowhammer attacks launched from Intel …

A deeper look into rowhammer's sensitivities: Experimental analysis of real dram chips and implications on future attacks and defenses

L Orosa, AG Yaglikci, H Luo, A Olgun, J Park… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
RowHammer is a circuit-level DRAM vulnerability where repeatedly accessing (ie,
hammering) a DRAM row can cause bit flips in physically nearby rows. The RowHammer …

CSI: Rowhammer–Cryptographic security and integrity against rowhammer

J Juffinger, L Lamster, A Kogler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …

Shadow: Preventing row hammer in dram with intra-subarray row shuffling

M Wi, J Park, S Ko, MJ Kim, NS Kim… - … Symposium on High …, 2023 - ieeexplore.ieee.org
As Row Hammer (RH) attacks have been a critical threat to computer systems, numerous
hardware-based (HWbased) RH mitigation strategies have been proposed. However, the …