Randomized row-swap: Mitigating row hammer by breaking spatial correlation between aggressor and victim rows
Row Hammer is a fault-injection attack in which rapid activations to a single DRAM row
causes bit-flips in nearby rows. Several recent defenses propose tracking aggressor-rows …
causes bit-flips in nearby rows. Several recent defenses propose tracking aggressor-rows …
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …
Hydra: Enabling low-overhead mitigation of row-hammer at ultra-low thresholds via hybrid tracking
DRAM systems continue to be plagued by the Row-Hammer (RH) security vulnerability. The
threshold number of row activations (TRH) required to induce RH has reduced rapidly from …
threshold number of row activations (TRH) required to induce RH has reduced rapidly from …
Scalable and secure row-swap: Efficient and safe row hammer mitigation in memory systems
As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly
susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows) …
susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows) …
Morphable counters: Enabling compact integrity trees for low-overhead secure memories
Securing off-chip main memory is essential for protection from adversaries with physical
access to systems. However, current secure-memory designs incur considerable …
access to systems. However, current secure-memory designs incur considerable …
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through {MAGIC}
Confidentiality, authenticity, integrity of data, and runtime security are ubiquitous concerns in
modern computer systems. However, these security concerns have traditionally been …
modern computer systems. However, these security concerns have traditionally been …
Chaotic weights: A novel approach to protect intellectual property of deep neural networks
Despite the high accuracy achieved by the deep neural network (DNN) technique, there is
still a lack of satisfying methodologies to protect the intellectual property (IP) of DNNs, which …
still a lack of satisfying methodologies to protect the intellectual property (IP) of DNNs, which …
Triad-nvm: Persistency for integrity-protected and encrypted non-volatile memories
Non-Volatile Memory is here and provides an attractive fabric for main memory. Unlike
DRAM, non-volatile main memory (NVMM) retains data after power loss. This allows …
DRAM, non-volatile main memory (NVMM) retains data after power loss. This allows …
Anubis: ultra-low overhead and recovery time for secure non-volatile memories
Implementing secure Non-Volatile Memories (NVMs) is challenging, mainly due to the
necessity to persist security metadata along with data. Unlike conventional secure …
necessity to persist security metadata along with data. Unlike conventional secure …
[PDF][PDF] Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories.
With Non-Volatile Memories (NVMs) beginning to enter the mainstream computing market, it
is time to consider how to secure NVM-equipped computing systems. Recent Meltdown and …
is time to consider how to secure NVM-equipped computing systems. Recent Meltdown and …