A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …
applications and systems. One popular type of such attacks is the microarchitectural attack …
On DRAM rowhammer and the physics of insecurity
AJ Walker, S Lee, D Beery - IEEE Transactions on Electron …, 2021 - ieeexplore.ieee.org
The dynamic random access memory (DRAM) disturb known as rowhammer (RH) has come
to dominate the insecurity of computing systems worldwide. Several studies have …
to dominate the insecurity of computing systems worldwide. Several studies have …
A modern primer on processing in memory
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …
design choice goes directly against at least three key trends in computing that cause …
Benchmarking a new paradigm: Experimental analysis and characterization of a real processing-in-memory system
Many modern workloads, such as neural networks, databases, and graph processing, are
fundamentally memory-bound. For such workloads, the data movement between main …
fundamentally memory-bound. For such workloads, the data movement between main …
SIMDRAM: A framework for bit-serial SIMD processing using DRAM
Processing-using-DRAM has been proposed for a limited set of basic operations (ie, logic
operations, addition). However, in order to enable full adoption of processing-using-DRAM …
operations, addition). However, in order to enable full adoption of processing-using-DRAM …
Rowpress: Amplifying read disturbance in modern dram chips
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …
Blacksmith: Scalable rowhammering in the frequency domain
We present the new class of non-uniform Rowhammer access patterns that bypass
undocumented, proprietary in-DRAM Target Row Refresh (TRR) while operating in a …
undocumented, proprietary in-DRAM Target Row Refresh (TRR) while operating in a …
Uncovering in-dram rowhammer protection mechanisms: A new methodology, custom rowhammer patterns, and implications
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect
against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips …
against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips …
Blockhammer: Preventing rowhammer at low cost by blacklisting rapidly-accessed dram rows
Aggressive memory density scaling causes modern DRAM devices to suffer from
RowHammer, a phenomenon where rapidly activating (ie, hammering) a DRAM row can …
RowHammer, a phenomenon where rapidly activating (ie, hammering) a DRAM row can …
DAMOV: A new methodology and benchmark suite for evaluating data movement bottlenecks
Data movement between the CPU and main memory is a first-order obstacle against improv
ing performance, scalability, and energy efficiency in modern systems. Computer systems …
ing performance, scalability, and energy efficiency in modern systems. Computer systems …