From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy

M Gupta, CK Akiri, K Aryal, E Parker, L Praharaj - IEEE Access, 2023 - ieeexplore.ieee.org
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital
transformation in the year 2022. As the different GenAI models like ChatGPT and Google …

Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

A modern primer on processing in memory

O Mutlu, S Ghose, J Gómez-Luna… - … computing: from devices …, 2022 - Springer
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …

Rowpress: Amplifying read disturbance in modern dram chips

H Luo, A Olgun, AG Yağlıkçı, YC Tuğrul… - Proceedings of the 50th …, 2023 - dl.acm.org
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …

TRRespass: Exploiting the many sides of target row refresh

P Frigo, E Vannacc, H Hassan… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …

Rowhammer: A retrospective

O Mutlu, JS Kim - … Transactions on Computer-Aided Design of …, 2019 - ieeexplore.ieee.org
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …

Security issues and challenges for virtualization technologies

F Sierra-Arriaga, R Branco, B Lee - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Virtualization-based technologies have become ubiquitous in computing. While they provide
an easy-to-implement platform for scalable, high-availability services, they also introduce …

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

W Wang, G Chen, X Pan, Y Zhang, XF Wang… - Proceedings of the …, 2017 - dl.acm.org
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …

Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques

JS Kim, M Patel, AG Yağlıkçı, H Hassan… - 2020 ACM/IEEE 47th …, 2020 - ieeexplore.ieee.org
RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in
2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows …

Error characterization, mitigation, and recovery in flash-memory-based solid-state drives

Y Cai, S Ghose, EF Haratsch, Y Luo… - Proceedings of the …, 2017 - ieeexplore.ieee.org
NAND flash memory is ubiquitous in everyday life today because its capacity has
continuously increased and cost has continuously decreased over decades. This positive …