ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1710.00551
  4. Cited By
Another Flip in the Wall of Rowhammer Defenses

Another Flip in the Wall of Rowhammer Defenses

2 October 2017
Daniel Gruss
Moritz Lipp
Michael Schwarz
Daniel Genkin
Jonas Juffinger
Sioli O'Connell
Wolfgang Schoechl
Y. Yarom
ArXivPDFHTML

Papers citing "Another Flip in the Wall of Rowhammer Defenses"

16 / 16 papers shown
Title
Revisiting DRAM Read Disturbance: Identifying Inconsistencies Between Experimental Characterization and Device-Level Studies
Revisiting DRAM Read Disturbance: Identifying Inconsistencies Between Experimental Characterization and Device-Level Studies
Haocong Luo
Ismail Emir Yüksel
Ataberk Olgun
A. Giray Yağlıkçı
O. Mutlu
68
1
0
20 Mar 2025
QPRAC: Towards Secure and Practical PRAC-based Rowhammer Mitigation using Priority Queues
QPRAC: Towards Secure and Practical PRAC-based Rowhammer Mitigation using Priority Queues
Jeonghyun Woo
Shaopeng
Prashant J. Nair
A. Jaleel
Gururaj Saileshwar
119
2
0
31 Jan 2025
Securing DRAM at Scale: ARFM-Driven Row Hammer Defense with Unveiling the Threat of Short tRC Patterns
Securing DRAM at Scale: ARFM-Driven Row Hammer Defense with Unveiling the Threat of Short tRC Patterns
Nogeun Joo
Donghyuk Kim
Hyunjun Cho
Junseok Noh
Dongha Jung
Joo-Young Kim
61
0
0
24 Jan 2025
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference
Qifan Wang
Shujie Cui
Lei Zhou
Ye Dong
Jianli Bai
Yun Sing Koh
Giovanni Russello
62
0
0
01 May 2023
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud
  Providers
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
L. Cojocar
Jeremie S. Kim
Minesh Patel
L. Tsai
S. Saroiu
A. Wolman
O. Mutlu
47
104
0
10 Mar 2020
Stacco: Differentially Analyzing Side-Channel Traces for Detecting
  SSL/TLS Vulnerabilities in Secure Enclaves
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao
Mengyuan Li
Sanchuan Chen
Yinqian Zhang
51
72
0
11 Jul 2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
  Hazards in SGX
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
Xiaofeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
AAML
46
370
0
20 May 2017
CacheZoom: How SGX Amplifies The Power of Cache Attacks
CacheZoom: How SGX Amplifies The Power of Cache Attacks
A. Moghimi
Gorka Irazoqui Apecechea
T. Eisenbarth
35
333
0
20 Mar 2017
HardIDX: Practical and Secure Index with SGX
HardIDX: Practical and Secure Index with SGX
Benny Fuhry
Raad Bahmani
Ferdinand Brasser
Florian Hahn
Florian Kerschbaum
A. Sadeghi
21
112
0
14 Mar 2017
The RowHammer Problem and Other Issues We May Face as Memory Becomes
  Denser
The RowHammer Problem and Other Issues We May Face as Memory Becomes Denser
O. Mutlu
41
173
0
02 Mar 2017
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Michael Schwarz
Samuel Weiser
Daniel Gruss
Clémentine Maurice
Stefan Mangard
44
424
0
28 Feb 2017
Software Grand Exposure: SGX Cache Attacks Are Practical
Software Grand Exposure: SGX Cache Attacks Are Practical
Ferdinand Brasser
Urs Müller
Alexandra Dmitrienko
Kari Kostiainen
Srdjan Capkun
A. Sadeghi
AAML
80
605
0
24 Feb 2017
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch
  Shadowing
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
43
504
0
21 Nov 2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P. Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
52
447
0
27 Nov 2015
Flush+Flush: A Fast and Stealthy Cache Attack
Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss
Clémentine Maurice
Klaus Wagner
Stefan Mangard
62
577
0
14 Nov 2015
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Daniel Gruss
Clémentine Maurice
Stefan Mangard
42
415
0
24 Jul 2015
1