Machine learning-based Rowhammer mitigation

BK Joardar, TK Bletsch… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rowhammer is a security vulnerability that arises due to the undesirable electrical
interaction between physically adjacent rows in DRAMs. Bit flips caused by Rowhammer …

Alarm: Active learning of rowhammer mitigations

A Naseredini, M Berger, M Sammartino… - Proceedings of the 11th …, 2022 - dl.acm.org
Rowhammer is a serious security problem of contemporary dynamic random-access
memory (DRAM) where reads or writes of bits can flip other bits. DRAM manufacturers add …

Learning to mitigate rowhammer attacks

BK Joardar, TK Bletsch… - 2022 Design, Automation …, 2022 - ieeexplore.ieee.org
Rowhammer is a vulnerability that arises due to the undesirable interaction between
physically adjacent rows in DRAMs. Existing DRAM protections are not adequate to defend …

Revisiting row hammer: A deep dive into understanding and resolving the issue

H Wang, X Peng, Z Liu, X Huang, T Li, B Yang… - Microelectronics …, 2024 - Elsevier
Row hammer is a vulnerability in Dynamic Random Access Memory (DRAM) chips, whereby
repeatedly accessing a specific row in the DRAM chip may cause bit flips in memory cells …

The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection

M Mushtaq, MM Yousaf, MK Bhatti, V Lapotre… - Annals of …, 2022 - Springer
Most of the mitigation techniques against access-driven cache side-channel attacks
(CSCAs) are not very effective. This is mainly because most mitigation techniques usually …

Reducing the Silicon Area Overhead of Counter-Based Rowhammer Mitigations

L France, F Bruguier, D Novo… - IEEE Computer …, 2023 - ieeexplore.ieee.org
Modern computer memories have shown to have reliability issues. The main memory is the
target of a security threat called Rowhammer, which causes bit flips in adjacent victim cells …

Virtual platform to analyze the security of a system on chip at microarchitectural level

Q Forcioli, JL Danger, C Maurice… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The processors (CPUs) embedded in System on Chip (SoC) have to face recent attacks
taking advantage of vulnerabilities/features in their microarchitectures to retrieve secret …

Implementing rowhammer memory corruption in the gem5 simulator

L France, F Bruguier, M Mushtaq… - … Workshop on Rapid …, 2021 - ieeexplore.ieee.org
Modern computer memories have shown to have reliability issues. The main memory is the
target of a security threat called Rowhammer, which causes bit flips in adjacent victim cells …

Mitigation of Rowhammer Attack on DDR4 Memory: A Novel Multi-Table Frequent Element Algorithm Based Approach

S Sylvester, J Sandersan… - 2023 IEEE 66th …, 2023 - ieeexplore.ieee.org
As Rowhammer attacks have become more and more of a threat to modern computer
systems using DRAM as main memory, defenses against it have to improve to match …

Vulnerability Assessment for the Rowhammer Attack Using Hardware Performance Counters and Machine Learning

B Kolić, M Mushtaq - International Workshop on Security Proofs for …, 2024 - hal.science
Numerous machines using DRAM chips as main memory are vulnerable to the Rowhammer
attack, which can be used as a tool for privilege escalation. The existing mitigation …