Results 41 to 50 of about 894 (89)

RAMPART: RowHammer Mitigation and Repair for Server Memory Systems

open access: yes, 2023
RowHammer attacks are a growing security and reliability concern for DRAMs and computer systems as they can induce many bit errors that overwhelm error detection and correction capabilities.
Elsasser, Wendy   +6 more
core  

Implementation of Rowhammer Effect in gem5

open access: yes, 2021
Modern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Existing architectures simulator don't provide any implementation of unintended memory modifications like bit-flips.
France, Loïc   +4 more
openaire   +1 more source

Body of Knowledge for Graphics Processing Units (GPUs) [PDF]

open access: yes
Graphics Processing Units (GPU) have emerged as a proven technology that enables high performance computing and parallel processing in a small form factor.
Wyrwas, Edward
core   +1 more source

FP-Rowhammer: DRAM-Based Device Fingerprinting

open access: yesProceedings of the 20th ACM Asia Conference on Computer and Communications Security
Device fingerprinting leverages attributes that capture heterogeneity in hardware and software configurations to extract unique and stable fingerprints. Fingerprinting countermeasures attempt to either present a uniform fingerprint across different devices through normalization or present different fingerprints for the same device each time through ...
Hari Venugopalan   +5 more
openaire   +2 more sources

LeapFrog: The Rowhammer Instruction Skip Attack

open access: yes2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P)
Accepted at EuroS&P 2025 and Hardware.io 2024,
Adiletta, Andrew   +4 more
openaire   +2 more sources

Double Data Rate (DDR) Memory Devices [PDF]

open access: yes
This presentation will include information about Double Data Rate (DDR) technology, NASA Electronic Parts and Packaging (NEPP) tasks and their purpose, collaborations, a roadmap, NEPP partners, results to date, and future ...
Wyrwas, Edward J.
core   +1 more source

TeleHammer: A Formal Model of Implicit Rowhammer

open access: yes, 2019
The rowhammer bug allows an attacker to gain privilege escalation or steal private data. A key requirement of all existing rowhammer attacks is that an attacker must have access to at least part of an exploitable hammer row. We refer to such rowhammer attacks as PeriHammer.
Zhang, Zhi   +4 more
openaire   +2 more sources

SoK: Rowhammer on Commodity Operating Systems

open access: yesProceedings of the 19th ACM Asia Conference on Computer and Communications Security
Rowhammer has drawn much attention from both academia and industry in the past years as rowhammer exploitation poses severe consequences to system security. Since the first comprehensive study of rowhammer in 2014, a number of rowhammer attacks have been demonstrated against dynamic random access memory (DRAM)-based commodity systems to break software ...
Zhi Zhang   +10 more
openaire   +2 more sources

Creative malfunction : finding fault with Rowhammer [PDF]

open access: yes, 2021
This essay offers a close reading of a notable computer security vulnerability: the Rowhammer bug in Dynamic Random Access Memory. The story of Rowhammer provides a vivid demonstration of how previously unanticipated possibilities of malfunction emerge as vulnerabilities and, in demanding repair, exert strong pressures on the future development of ...
openaire  

Home - About - Disclaimer - Privacy