ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2306.16093
  4. Cited By
Retrospective: Flipping Bits in Memory Without Accessing Them: An
  Experimental Study of DRAM Disturbance Errors

Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors

28 June 2023
O. Mutlu
ArXivPDFHTML

Papers citing "Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors"

50 / 130 papers shown
Title
SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR
  Interface
SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface
Ali Fakhrzadehgan
Prakash Ramrakhyani
Moinuddin K. Qureshi
M. Erez
13
5
0
01 Sep 2022
Survey on Architectural Attacks: A Unified Classification and Attack
  Model
Survey on Architectural Attacks: A Unified Classification and Attack Model
Tara Ghasempouri
J. Raik
C. Reinbrecht
Said Hamdioui
M. Taouil
AAML
9
7
0
30 Aug 2022
Detection and Mitigation of Byzantine Attacks in Distributed Training
Detection and Mitigation of Byzantine Attacks in Distributed Training
Konstantinos Konstantinidis
Namrata Vaswani
Aditya Ramamoorthy
AAML
18
0
0
17 Aug 2022
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
Jiawang Bai
Kuofeng Gao
Dihong Gong
Shutao Xia
Zhifeng Li
W. Liu
AAML
22
27
0
27 Jul 2022
Versatile Weight Attack via Flipping Limited Bits
Versatile Weight Attack via Flipping Limited Bits
Jiawang Bai
Baoyuan Wu
Zhifeng Li
Shutao Xia
AAML
21
17
0
25 Jul 2022
High-Level Approaches to Hardware Security: A Tutorial
High-Level Approaches to Hardware Security: A Tutorial
Hammond Pearce
Ramesh Karri
Benjamin Tan
19
7
0
21 Jul 2022
Revealing Secrets From Pre-trained Models
Revealing Secrets From Pre-trained Models
Mujahid Al Rafi
Yuan Feng
Hyeran Jeon
13
0
0
19 Jul 2022
Implementing and Breaking Load-Link / Store-Conditional on an ARM-Based
  System
Implementing and Breaking Load-Link / Store-Conditional on an ARM-Based System
Evan Tilley
Alexander Y Liebeskind
Rafael Asensio
11
0
0
19 Jul 2022
Understanding RowHammer Under Reduced Wordline Voltage: An Experimental
  Study Using Real DRAM Devices
Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
A. G. Yaglikçi
Haocong Luo
Geraldo F. de Oliviera
Ataberk Olgun
Minesh Patel
Jisung Park
Hasan Hassan
Jeremie S. Kim
Lois Orosa
O. Mutlu
11
48
0
20 Jun 2022
Edge Security: Challenges and Issues
Edge Security: Challenges and Issues
Xin Jin
Charalampos Katsis
Fan Sang
Jiahao Sun
A. Kundu
Ramana Rao Kompella
39
8
0
14 Jun 2022
MAD-EN: Microarchitectural Attack Detection through System-wide Energy
  Consumption
MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption
Debopriya Roy Dipta
Berk Gülmezoglu
12
4
0
31 May 2022
How Much is Performance Worth to Users? A Quantitative Approach
How Much is Performance Worth to Users? A Quantitative Approach
A. Hastings
Lydia B. Chilton
S. Sethumadhavan
11
0
0
27 Apr 2022
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced
  Taint Tracking
BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking
Hossam ElAtali
Lachlan J. Gunn
Hans Liljestrand
Nadarajah Asokan
18
4
0
20 Apr 2022
Special Session: Towards an Agile Design Methodology for Efficient,
  Reliable, and Secure ML Systems
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems
Shail Dave
Alberto Marchisio
Muhammad Abdullah Hanif
Amira Guesmi
Aviral Shrivastava
Ihsen Alouani
Muhammad Shafique
28
13
0
18 Apr 2022
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Minimizing Trust with Exclusively-Used Physically-Isolated Hardware
Zhihao Yao
S. Talebi
M. Chen
A. A. Sani
Thomas Anderson
17
1
0
15 Mar 2022
Signature Correction Attack on Dilithium Signature Scheme
Signature Correction Attack on Dilithium Signature Scheme
Saad Islam
K. Mus
Richa Singh
Patrick Schaumont
B. Sunar
11
26
0
01 Mar 2022
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Claudio Canella
Sebastian Dorn
Daniel Gruss
Michael Schwarz
21
8
0
28 Feb 2022
FPHammer: A Device Identification Framework based on DRAM Fingerprinting
FPHammer: A Device Identification Framework based on DRAM Fingerprinting
Dawei Li
Di Liu
Yangkun Ren
Ziyi Wang
Yu Sun
Zhenyu Guan
Qianhong Wu
Jianwei Liu
17
3
0
19 Jan 2022
SoK: Rowhammer on Commodity Operating Systems
SoK: Rowhammer on Commodity Operating Systems
Zhi-Li Zhang
Decheng Chen
Jiahao Qi
Yueqiang Cheng
Shijie Jiang
...
Yansong Gao
Surya Nepal
Yi Zou
Jiliang Zhang
Yang Xiang
13
3
0
09 Jan 2022
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
Stealthy Attack on Algorithmic-Protected DNNs via Smart Bit Flipping
B. Ghavami
Seyd Movi
Zhenman Fang
Lesley Shannon
AAML
32
9
0
25 Dec 2021
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer
  Authentication
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
Sungbae Yoo
Jinbum Park
Seolheui Kim
Yeji Kim
Taesoo Kim
LLMSV
14
32
0
14 Dec 2021
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web
  Tracking
Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking
Peter Snyder
Soroush Karami
Arthur Edelstein
B. Livshits
Hamed Haddadi
17
6
0
12 Dec 2021
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance
  Features for Inter-Chip Privilege Escalation
Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation
J. Classen
Francesco Gringoli
Michael Hermann
M. Hollick
10
10
0
10 Dec 2021
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
BDFA: A Blind Data Adversarial Bit-flip Attack on Deep Neural Networks
B. Ghavami
Mani Sadati
M. Shahidzadeh
Zhenman Fang
Lesley Shannon
AAML
9
1
0
07 Dec 2021
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural
  Networks
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks
Xiangyu Qi
Tinghao Xie
Ruizhe Pan
Jifeng Zhu
Yong-Liang Yang
Kai Bu
AAML
25
57
0
25 Nov 2021
Domain Page-Table Isolation
Domain Page-Table Isolation
Claudio Canella
Andreas Kogler
Lukas Giner
Daniel Gruss
Michael Schwarz
14
3
0
21 Nov 2021
Attacking Deep Learning AI Hardware with Universal Adversarial
  Perturbation
Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Mehdi Sadi
B. M. S. Bahar Talukder
Kaniz Mishty
Md. Tauhidur Rahman
AAML
29
0
0
18 Nov 2021
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight
  Stealing in Memories
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
Adnan Siraj Rakin
Md Hafizul Islam Chowdhuryy
Fan Yao
Deliang Fan
AAML
MIACV
36
110
0
08 Nov 2021
PIM-Enclave: Bringing Confidential Computation Inside Memory
PIM-Enclave: Bringing Confidential Computation Inside Memory
Kha Dinh Duy
Hojoon Lee
14
1
0
05 Nov 2021
HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks
  on Deep Neural Networks
HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks
Mojan Javaheripi
F. Koushanfar
14
22
0
02 Nov 2021
ZeBRA: Precisely Destroying Neural Networks with Zero-Data Based
  Repeated Bit Flip Attack
ZeBRA: Precisely Destroying Neural Networks with Zero-Data Based Repeated Bit Flip Attack
Dahoon Park
K. Kwon
Sunghoon Im
Jaeha Kung
AAML
13
3
0
01 Nov 2021
Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving
  Adversarial Outcomes
Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes
Sanghyun Hong
Michael-Andrei Panaitescu-Liess
Yigitcan Kaya
Tudor Dumitras
MQ
52
13
0
26 Oct 2021
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology,
  Custom RowHammer Patterns, and Implications
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications
Hasan Hassan
Yahya Can Tugrul
Jeremie S. Kim
V. V. D. Veen
Kaveh Razavi
O. Mutlu
37
99
0
20 Oct 2021
A Deeper Look into RowHammer`s Sensitivities: Experimental Analysis of
  Real DRAM Chips and Implications on Future Attacks and Defenses
A Deeper Look into RowHammer`s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses
Lois Orosa
A. G. Yaglikçi
Haocong Luo
Ataberk Olgun
Jisung Park
Hasan Hassan
Minesh Patel
Jeremie S. Kim
O. Mutlu
15
84
0
19 Oct 2021
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural
  Networks
TESDA: Transform Enabled Statistical Detection of Attacks in Deep Neural Networks
C. Amarnath
Aishwarya H. Balwani
Kwondo Ma
Abhijit Chatterjee
AAML
13
3
0
16 Oct 2021
Don't Knock! Rowhammer at the Backdoor of DNN Models
Don't Knock! Rowhammer at the Backdoor of DNN Models
M. Tol
Saad Islam
Andrew J. Adiletta
B. Sunar
Ziming Zhang
AAML
27
15
0
14 Oct 2021
Adversarial Attacks on Spiking Convolutional Neural Networks for
  Event-based Vision
Adversarial Attacks on Spiking Convolutional Neural Networks for Event-based Vision
Julian Buchel
Gregor Lenz
Yalun Hu
Sadique Sheik
M. Sorbaro
AAML
25
14
0
06 Oct 2021
Benchmarking Memory-Centric Computing Systems: Analysis of Real
  Processing-in-Memory Hardware
Benchmarking Memory-Centric Computing Systems: Analysis of Real Processing-in-Memory Hardware
Juan Gómez Luna
I. E. Hajj
Ivan Fernandez
Christina Giannoula
Geraldo F. Oliveira
O. Mutlu
28
67
0
04 Oct 2021
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks
Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks
Chongzhou Fang
Han Wang
Najmeh Nazari
Behnam Omidi
Avesta Sasan
Khaled N. Khasawneh
S. Rafatirad
Houman Homayoun
17
14
0
02 Oct 2021
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive
  Process Scheduler
LEASH: Enhancing Micro-architectural Attack Detection with a Reactive Process Scheduler
Nikhilesh Singh
Chester Rebeiro
15
2
0
09 Sep 2021
Aspis: Robust Detection for Distributed Learning
Aspis: Robust Detection for Distributed Learning
Konstantinos Konstantinidis
A. Ramamoorthy
AAML
15
5
0
05 Aug 2021
Security Analysis of the Silver Bullet Technique for RowHammer
  Prevention
Security Analysis of the Silver Bullet Technique for RowHammer Prevention
A. G. Yaglikçi
Jeremie S. Kim
Fabrice Devaux
O. Mutlu
22
34
0
13 Jun 2021
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities
  and Optimizations
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations
Lois Orosa
Yaohua Wang
Mohammad Sadrosadati
Jeremie S. Kim
Minesh Patel
...
Juan Gómez Luna
Hasan Hassan
Nika Mansouri-Ghiasi
Saugata Ghose
O. Mutlu
22
30
0
10 Jun 2021
IChannels: Exploiting Current Management Mechanisms to Create Covert
  Channels in Modern Processors
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
Jawad Haj-Yahya
Jeremie S. Kim
A. G. Yaglikçi
Ivan Puddu
Lois Orosa
Juan Gómez Luna
M. Alser
O. Mutlu
13
17
0
09 Jun 2021
SPFA: SFA on Multiple Persistent Faults
SPFA: SFA on Multiple Persistent Faults
Susanne Engels
Falk Schellenberg
C. Paar
14
9
0
28 May 2021
SIMDRAM: An End-to-End Framework for Bit-Serial SIMD Computing in DRAM
SIMDRAM: An End-to-End Framework for Bit-Serial SIMD Computing in DRAM
Nastaran Hajinazar
Geraldo F. Oliveira
Sven Gregorio
João Dinis Ferreira
Nika Mansouri-Ghiasi
Minesh Patel
M. Alser
Saugata Ghose
Juan Gómez Luna
O. Mutlu
12
16
0
26 May 2021
QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple
  Row Activation in Commodity DRAM Chips
QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips
Ataberk Olgun
Minesh Patel
A. G. Yaglikçi
Haocong Luo
Jeremie S. Kim
Nisa Bostanci
Nandita Vijaykumar
Oguz Ergin
O. Mutlu
25
61
0
19 May 2021
Comprehensive Study of Security and Privacy of Emerging Non-Volatile
  Memories
Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories
Mohammad Nasim Imtiaz Khan
Swaroop Ghosh
32
15
0
13 May 2021
Benchmarking a New Paradigm: An Experimental Analysis of a Real
  Processing-in-Memory Architecture
Benchmarking a New Paradigm: An Experimental Analysis of a Real Processing-in-Memory Architecture
Juan Gómez Luna
I. E. Hajj
Ivan Fernandez
Christina Giannoula
Geraldo F. Oliveira
O. Mutlu
22
82
0
09 May 2021
DAMOV: A New Methodology and Benchmark Suite for Evaluating Data
  Movement Bottlenecks
DAMOV: A New Methodology and Benchmark Suite for Evaluating Data Movement Bottlenecks
Geraldo F. Oliveira
Juan Gómez Luna
Lois Orosa
Saugata Ghose
Nandita Vijaykumar
Ivan Fernandez
Mohammad Sadrosadati
O. Mutlu
28
82
0
08 May 2021
Previous
123
Next