Results 41 to 50 of about 894 (89)
RAMPART: RowHammer Mitigation and Repair for Server Memory Systems
RowHammer attacks are a growing security and reliability concern for DRAMs and computer systems as they can induce many bit errors that overwhelm error detection and correction capabilities.
Elsasser, Wendy +6 more
core
Implementation of Rowhammer Effect in gem5
Modern computer memories have been shown to have reliability issues. The main memory is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim cells of aggressor rows. Existing architectures simulator don't provide any implementation of unintended memory modifications like bit-flips.
France, Loïc +4 more
openaire +1 more source
Body of Knowledge for Graphics Processing Units (GPUs) [PDF]
Graphics Processing Units (GPU) have emerged as a proven technology that enables high performance computing and parallel processing in a small form factor.
Wyrwas, Edward
core +1 more source
FP-Rowhammer: DRAM-Based Device Fingerprinting
Device fingerprinting leverages attributes that capture heterogeneity in hardware and software configurations to extract unique and stable fingerprints. Fingerprinting countermeasures attempt to either present a uniform fingerprint across different devices through normalization or present different fingerprints for the same device each time through ...
Hari Venugopalan +5 more
openaire +2 more sources
LeapFrog: The Rowhammer Instruction Skip Attack
Accepted at EuroS&P 2025 and Hardware.io 2024,
Adiletta, Andrew +4 more
openaire +2 more sources
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone. [PDF]
Koutroumpouchos N +2 more
europepmc +1 more source
Double Data Rate (DDR) Memory Devices [PDF]
This presentation will include information about Double Data Rate (DDR) technology, NASA Electronic Parts and Packaging (NEPP) tasks and their purpose, collaborations, a roadmap, NEPP partners, results to date, and future ...
Wyrwas, Edward J.
core +1 more source
TeleHammer: A Formal Model of Implicit Rowhammer
The rowhammer bug allows an attacker to gain privilege escalation or steal private data. A key requirement of all existing rowhammer attacks is that an attacker must have access to at least part of an exploitable hammer row. We refer to such rowhammer attacks as PeriHammer.
Zhang, Zhi +4 more
openaire +2 more sources
SoK: Rowhammer on Commodity Operating Systems
Rowhammer has drawn much attention from both academia and industry in the past years as rowhammer exploitation poses severe consequences to system security. Since the first comprehensive study of rowhammer in 2014, a number of rowhammer attacks have been demonstrated against dynamic random access memory (DRAM)-based commodity systems to break software ...
Zhi Zhang +10 more
openaire +2 more sources
Creative malfunction : finding fault with Rowhammer [PDF]
This essay offers a close reading of a notable computer security vulnerability: the Rowhammer bug in Dynamic Random Access Memory. The story of Rowhammer provides a vivid demonstration of how previously unanticipated possibilities of malfunction emerge as vulnerabilities and, in demanding repair, exert strong pressures on the future development of ...
openaire

