Randomized row-swap: Mitigating row hammer by breaking spatial correlation between aggressor and victim rows

G Saileshwar, B Wang, M Qureshi, PJ Nair - Proceedings of the 27th …, 2022 - dl.acm.org
Row Hammer is a fault-injection attack in which rapid activations to a single DRAM row
causes bit-flips in nearby rows. Several recent defenses propose tracking aggressor-rows …

CSI: Rowhammer–Cryptographic security and integrity against rowhammer

J Juffinger, L Lamster, A Kogler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …

Hydra: Enabling low-overhead mitigation of row-hammer at ultra-low thresholds via hybrid tracking

M Qureshi, A Rohan, G Saileshwar… - Proceedings of the 49th …, 2022 - dl.acm.org
DRAM systems continue to be plagued by the Row-Hammer (RH) security vulnerability. The
threshold number of row activations (TRH) required to induce RH has reduced rapidly from …

Scalable and secure row-swap: Efficient and safe row hammer mitigation in memory systems

J Woo, G Saileshwar, PJ Nair - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly
susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows) …

Morphable counters: Enabling compact integrity trees for low-overhead secure memories

G Saileshwar, PJ Nair, P Ramrakhyani… - 2018 51st Annual …, 2018 - ieeexplore.ieee.org
Securing off-chip main memory is essential for protection from adversaries with physical
access to systems. However, current secure-memory designs incur considerable …

Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through {MAGIC}

L Lamster, M Unterguggenberger… - 33rd USENIX Security …, 2024 - usenix.org
Confidentiality, authenticity, integrity of data, and runtime security are ubiquitous concerns in
modern computer systems. However, these security concerns have traditionally been …

Chaotic weights: A novel approach to protect intellectual property of deep neural networks

N Lin, X Chen, H Lu, X Li - IEEE Transactions on Computer …, 2020 - ieeexplore.ieee.org
Despite the high accuracy achieved by the deep neural network (DNN) technique, there is
still a lack of satisfying methodologies to protect the intellectual property (IP) of DNNs, which …

Triad-nvm: Persistency for integrity-protected and encrypted non-volatile memories

A Awad, M Ye, Y Solihin, L Njilla… - Proceedings of the 46th …, 2019 - dl.acm.org
Non-Volatile Memory is here and provides an attractive fabric for main memory. Unlike
DRAM, non-volatile main memory (NVMM) retains data after power loss. This allows …

Anubis: ultra-low overhead and recovery time for secure non-volatile memories

KA Zubair, A Awad - Proceedings of the 46th International Symposium …, 2019 - dl.acm.org
Implementing secure Non-Volatile Memories (NVMs) is challenging, mainly due to the
necessity to persist security metadata along with data. Unlike conventional secure …

[PDF][PDF] Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories.

M Ye, C Hughes, A Awad - 2018 - osti.gov
With Non-Volatile Memories (NVMs) beginning to enter the mainstream computing market, it
is time to consider how to secure NVM-equipped computing systems. Recent Meltdown and …