Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
2306.16093
Cited By
Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors
28 June 2023
O. Mutlu
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors"
50 / 130 papers shown
Title
SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface
Ali Fakhrzadehgan
Prakash Ramrakhyani
Moinuddin K. Qureshi
M. Erez
13
5
0
01 Sep 2022
Survey on Architectural Attacks: A Unified Classification and Attack Model
Tara Ghasempouri
J. Raik
C. Reinbrecht
Said Hamdioui
M. Taouil
AAML
17
7
0
30 Aug 2022
Detection and Mitigation of Byzantine Attacks in Distributed Training
Konstantinos Konstantinidis
Namrata Vaswani
Aditya Ramamoorthy
AAML
24
0
0
17 Aug 2022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Jiawang Bai
Kuofeng Gao
Dihong Gong
Shutao Xia
Zhifeng Li
Wei Liu
AAML
22
27
0
27 Jul 2022
Versatile Weight Attack via Flipping Limited Bits
Jiawang Bai
Baoyuan Wu
Zhifeng Li
Shutao Xia
AAML
21
17
0
25 Jul 2022
High-Level Approaches to Hardware Security: A Tutorial
Hammond Pearce
Ramesh Karri
Benjamin Tan
19
7
0
21 Jul 2022
Revealing Secrets From Pre-trained Models
Mujahid Al Rafi
Yuan Feng
Hyeran Jeon
15
0
0
19 Jul 2022
Implementing and Breaking Load-Link / Store-Conditional on an ARM-Based System
Evan Tilley
Alexander Y Liebeskind
Rafael Asensio
16
0
0
19 Jul 2022
Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
A. G. Yaglikçi
Haocong Luo
Geraldo F. de Oliviera
Ataberk Olgun
Minesh Patel
Jisung Park
Hasan Hassan
Jeremie S. Kim
Lois Orosa
O. Mutlu
13
48
0
20 Jun 2022
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
47
8
0
14 Jun 2022
MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption
Debopriya Roy Dipta
Berk Gülmezoglu
17
4
0
31 May 2022
How Much is Performance Worth to Users? A Quantitative Approach
A. Hastings
Lydia B. Chilton
S. Sethumadhavan
16
0
0
27 Apr 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
23
4
0
20 Apr 2022
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems
Shail Dave
Alberto Marchisio
Muhammad Abdullah Hanif
Amira Guesmi
Aviral Shrivastava
Ihsen Alouani
Muhammad Shafique
34
13
0
18 Apr 2022
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Zhihao Yao
S. Talebi
M. Chen
A. A. Sani
Thomas Anderson
19
1
0
15 Mar 2022
Signature Correction Attack on Dilithium Signature Scheme
Saad Islam
K. Mus
Richa Singh
Patrick Schaumont
B. Sunar
11
26
0
01 Mar 2022
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Claudio Canella
Sebastian Dorn
Daniel Gruss
Michael Schwarz
26
8
0
28 Feb 2022
FPHammer: A Device Identification Framework based on DRAM Fingerprinting
Dawei Li
Di Liu
Yangkun Ren
Ziyi Wang
Yu Sun
Zhenyu Guan
Qianhong Wu
Jianwei Liu
25
3
0
19 Jan 2022
SoK: Rowhammer on Commodity Operating Systems
Zhi-Li Zhang
Decheng Chen
Jiahao Qi
Yueqiang Cheng
Shijie Jiang
...
Yansong Gao
Surya Nepal
Yi Zou
Jiliang Zhang
Yang Xiang
21
3
0
09 Jan 2022
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
B. Ghavami
Seyd Movi
Zhenman Fang
Lesley Shannon
AAML
40
9
0
25 Dec 2021
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
Sungbae Yoo
Jinbum Park
Seolheui Kim
Yeji Kim
Taesoo Kim
LLMSV
16
32
0
14 Dec 2021
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking
Peter Snyder
Soroush Karami
Arthur Edelstein
B. Livshits
Hamed Haddadi
17
6
0
12 Dec 2021
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation
J. Classen
Francesco Gringoli
Michael Hermann
M. Hollick
15
10
0
10 Dec 2021
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
B. Ghavami
Mani Sadati
M. Shahidzadeh
Zhenman Fang
Lesley Shannon
AAML
19
1
0
07 Dec 2021
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Xiangyu Qi
Tinghao Xie
Ruizhe Pan
Jifeng Zhu
Yong-Liang Yang
Kai Bu
AAML
33
57
0
25 Nov 2021
Domain Page-Table Isolation
Claudio Canella
Andreas Kogler
Lukas Giner
Daniel Gruss
Michael Schwarz
14
3
0
21 Nov 2021
Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Mehdi Sadi
B. M. S. Bahar Talukder
Kaniz Mishty
Md. Tauhidur Rahman
AAML
37
0
0
18 Nov 2021
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Adnan Siraj Rakin
Md Hafizul Islam Chowdhuryy
Fan Yao
Deliang Fan
AAML
MIACV
42
110
0
08 Nov 2021
PIM-Enclave: Bringing Confidential Computation Inside Memory
Kha Dinh Duy
Hojoon Lee
19
1
0
05 Nov 2021
HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks
Mojan Javaheripi
F. Koushanfar
16
22
0
02 Nov 2021
ZeBRA: Precisely Destroying Neural Networks with Zero-Data Based Repeated Bit Flip Attack
Dahoon Park
K. Kwon
Sunghoon Im
Jaeha Kung
AAML
16
3
0
01 Nov 2021
Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes
Sanghyun Hong
Michael-Andrei Panaitescu-Liess
Yigitcan Kaya
Tudor Dumitras
MQ
60
13
0
26 Oct 2021
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications
Hasan Hassan
Yahya Can Tugrul
Jeremie S. Kim
V. V. D. Veen
Kaveh Razavi
O. Mutlu
41
99
0
20 Oct 2021
A Deeper Look into RowHammer`s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses
Lois Orosa
A. G. Yaglikçi
Haocong Luo
Ataberk Olgun
Jisung Park
Hasan Hassan
Minesh Patel
Jeremie S. Kim
O. Mutlu
17
84
0
19 Oct 2021
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
C. Amarnath
Aishwarya H. Balwani
Kwondo Ma
Abhijit Chatterjee
AAML
18
3
0
16 Oct 2021
Don't Knock! Rowhammer at the Backdoor of DNN Models
M. Tol
Saad Islam
Andrew J. Adiletta
B. Sunar
Ziming Zhang
AAML
32
15
0
14 Oct 2021
Adversarial Attacks on Spiking Convolutional Neural Networks for Event-based Vision
Julian Buchel
Gregor Lenz
Yalun Hu
Sadique Sheik
M. Sorbaro
AAML
25
14
0
06 Oct 2021
Benchmarking Memory-Centric Computing Systems: Analysis of Real Processing-in-Memory Hardware
Juan Gómez Luna
I. E. Hajj
Ivan Fernandez
Christina Giannoula
Geraldo F. Oliveira
O. Mutlu
30
67
0
04 Oct 2021
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks
Chongzhou Fang
Han Wang
Najmeh Nazari
Behnam Omidi
Avesta Sasan
Khaled N. Khasawneh
S. Rafatirad
Houman Homayoun
22
14
0
02 Oct 2021
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler
Nikhilesh Singh
Chester Rebeiro
20
2
0
09 Sep 2021
Aspis: Robust Detection for Distributed Learning
Konstantinos Konstantinidis
A. Ramamoorthy
AAML
15
5
0
05 Aug 2021
Security Analysis of the Silver Bullet Technique for RowHammer Prevention
A. G. Yaglikçi
Jeremie S. Kim
Fabrice Devaux
O. Mutlu
32
34
0
13 Jun 2021
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations
Lois Orosa
Yaohua Wang
Mohammad Sadrosadati
Jeremie S. Kim
Minesh Patel
...
Juan Gómez Luna
Hasan Hassan
Nika Mansouri-Ghiasi
Saugata Ghose
O. Mutlu
22
30
0
10 Jun 2021
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
Jawad Haj-Yahya
Jeremie S. Kim
A. G. Yaglikçi
Ivan Puddu
Lois Orosa
Juan Gómez Luna
M. Alser
O. Mutlu
13
17
0
09 Jun 2021
SPFA: SFA on Multiple Persistent Faults
Susanne Engels
Falk Schellenberg
C. Paar
19
9
0
28 May 2021
SIMDRAM: An End-to-End Framework for Bit-Serial SIMD Computing in DRAM
Nastaran Hajinazar
Geraldo F. Oliveira
Sven Gregorio
João Dinis Ferreira
Nika Mansouri-Ghiasi
Minesh Patel
M. Alser
Saugata Ghose
Juan Gómez Luna
O. Mutlu
24
16
0
26 May 2021
QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips
Ataberk Olgun
Minesh Patel
A. G. Yaglikçi
Haocong Luo
Jeremie S. Kim
Nisa Bostanci
Nandita Vijaykumar
Oguz Ergin
O. Mutlu
30
61
0
19 May 2021
Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories
Mohammad Nasim Imtiaz Khan
Swaroop Ghosh
32
15
0
13 May 2021
Benchmarking a New Paradigm: An Experimental Analysis of a Real Processing-in-Memory Architecture
Juan Gómez Luna
I. E. Hajj
Ivan Fernandez
Christina Giannoula
Geraldo F. Oliveira
O. Mutlu
27
82
0
09 May 2021
DAMOV: A New Methodology and Benchmark Suite for Evaluating Data Movement Bottlenecks
Geraldo F. Oliveira
Juan Gómez Luna
Lois Orosa
Saugata Ghose
Nandita Vijaykumar
Ivan Fernandez
Mohammad Sadrosadati
O. Mutlu
36
82
0
08 May 2021
Previous
1
2
3
Next