Ambit: In-memory accelerator for bulk bitwise operations using commodity DRAM technology

V Seshadri, D Lee, T Mullins, H Hassan… - Proceedings of the 50th …, 2017 - dl.acm.org
Many important applications trigger bulk bitwise operations, ie, bitwise operations on large
bit vectors. In fact, recent works design techniques that exploit fast bulk bitwise operations to …

Rowhammer: A retrospective

O Mutlu, JS Kim - … Transactions on Computer-Aided Design of …, 2019 - ieeexplore.ieee.org
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …

Uncovering in-dram rowhammer protection mechanisms: A new methodology, custom rowhammer patterns, and implications

H Hassan, YC Tugrul, JS Kim, V Van der Veen… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect
against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips …

[CARTE][B] Memory systems: cache, DRAM, disk

B Jacob, D Wang, S Ng - 2010 - books.google.com
Is your memory hierarchy stop** your microprocessor from performing at the high level it
should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem …

An experimental study of data retention behavior in modern DRAM devices: Implications for retention time profiling mechanisms

J Liu, B Jaiyen, Y Kim, C Wilkerson… - ACM SIGARCH Computer …, 2013 - dl.acm.org
DRAM cells store data in the form of charge on a capacitor. This charge leaks off over time,
eventually causing data to be lost. To prevent this data loss from occurring, DRAM cells must …

The DRAM latency PUF: Quickly evaluating physical unclonable functions by exploiting the latency-reliability tradeoff in modern commodity DRAM devices

JS Kim, M Patel, H Hassan… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) are commonly used in cryptography to identify
devices based on the uniqueness of their physical microstructures. DRAM-based PUFs have …

The RowHammer problem and other issues we may face as memory becomes denser

O Mutlu - Design, Automation & Test in Europe Conference & …, 2017 - ieeexplore.ieee.org
As memory scales down to smaller technology nodes, new failure mechanisms emerge that
threaten its correct operation. If such failure mechanisms are not anticipated and corrected …

Rowhammer attacks in dynamic random-access memory and defense methods

D Kim, H Park, I Yeo, YK Lee, Y Kim, HM Lee… - Sensors, 2024 - mdpi.com
This paper provides a comprehensive overview of the security vulnerability known as
rowhammer in Dynamic Random-Access Memory (DRAM). While DRAM offers many …

Adaptive-latency DRAM: Optimizing DRAM timing for the common-case

D Lee, Y Kim, G Pekhimenko, S Khan… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
In current systems, memory accesses to a DRAM chip must obey a set of minimum latency
restrictions specified in the DRAM standard. Such timing parameters exist to guarantee …

AVATAR: A variable-retention-time (VRT) aware refresh for DRAM systems

MK Qureshi, DH Kim, S Khan, PJ Nair… - 2015 45th Annual …, 2015 - ieeexplore.ieee.org
Multirate refresh techniques exploit the non-uniformity in retention times of DRAM cells to
reduce the DRAM refresh overheads. Such techniques rely on accurate profiling of retention …