ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2306.16093
  4. Cited By
Retrospective: Flipping Bits in Memory Without Accessing Them: An
  Experimental Study of DRAM Disturbance Errors

Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors

28 June 2023
O. Mutlu
ArXivPDFHTML

Papers citing "Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors"

30 / 130 papers shown
Title
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
SERVAS! Secure Enclaves via RISC-V Authenticryption Shield
Stefan Steinegger
David Schrammel
Samuel Weiser
Pascal Nasahl
Stefan Mangard
14
8
0
07 May 2021
Coherence Attacks and Countermeasures in Interposer-Based Systems
Coherence Attacks and Countermeasures in Interposer-Based Systems
Gino A. Chacon
Tapojyoti Mandal
J. Knechtel
Ozgur Sinanoglu
Paul V. Gratz
V. Soteriou
18
2
0
06 May 2021
Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and
  Fault-Injection Attacks
Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks
Faiq Khalid
Muhammad Abdullah Hanif
Muhammad Shafique
AAML
SILM
8
9
0
05 May 2021
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with
  ARM Pointer Authentication
FIPAC: Thwarting Fault- and Software-Induced Control-Flow Attacks with ARM Pointer Authentication
R. Schilling
Pascal Nasahl
Stefan Mangard
15
10
0
30 Apr 2021
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure
  DNN Accelerators
Random and Adversarial Bit Error Robustness: Energy-Efficient and Secure DNN Accelerators
David Stutz
Nandhini Chandramoorthy
Matthias Hein
Bernt Schiele
AAML
MQ
20
18
0
16 Apr 2021
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and
  Defenses in Cryptography
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography
Xiaoxuan Lou
Tianwei Zhang
Jun Jiang
Yinqian Zhang
AAML
23
87
0
26 Mar 2021
RA-BNN: Constructing Robust & Accurate Binary Neural Network to
  Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy
RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy
Adnan Siraj Rakin
Li Yang
Jingtao Li
Fan Yao
C. Chakrabarti
Yu Cao
Jae-sun Seo
Deliang Fan
AAML
MQ
23
25
0
22 Mar 2021
Targeted Attack against Deep Neural Networks via Flipping Limited Weight
  Bits
Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits
Jiawang Bai
Baoyuan Wu
Yong Zhang
Yiming Li
Zhifeng Li
Shutao Xia
AAML
14
74
0
21 Feb 2021
BlockHammer: Preventing RowHammer at Low Cost by Blacklisting
  Rapidly-Accessed DRAM Rows
BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows
A. G. Yaglikçi
Minesh Patel
Jeremie S. Kim
Roknoddin Azizi
Ataberk Olgun
...
Jisung Park
Konstantinos Kanellopoulos
Taha Shahroodi
Saugata Ghose
O. Mutlu
55
139
0
11 Feb 2021
RADAR: Run-time Adversarial Weight Attack Detection and Accuracy
  Recovery
RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery
Jingtao Li
Adnan Siraj Rakin
Zhezhi He
Deliang Fan
C. Chakrabarti
AAML
14
39
0
20 Jan 2021
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using
  Cryptographically Colored Memory
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
Pascal Nasahl
R. Schilling
M. Werner
J. Hoogerbrugge
M. Medwed
Stefan Mangard
6
19
0
12 Dec 2020
Automating Seccomp Filter Generation for Linux Applications
Automating Seccomp Filter Generation for Linux Applications
Claudio Canella
M. Werner
Daniel Gruss
Michael Schwarz
6
40
0
04 Dec 2020
Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory
  Architectures to Adversarial Attacks in Deep Neural Networks
Exposing the Robustness and Vulnerability of Hybrid 8T-6T SRAM Memory Architectures to Adversarial Attacks in Deep Neural Networks
Abhishek Moitra
Priyadarshini Panda
AAML
11
2
0
26 Nov 2020
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Raad Bahmani
Ferdinand Brasser
Ghada Dessouky
Patrick Jauernig
Matthias Klimmek
A. Sadeghi
Emmanuel Stapf
11
118
0
29 Oct 2020
SPAM: Stateless Permutation of Application Memory
SPAM: Stateless Permutation of Application Memory
M. T. I. Ziad
Miguel A. Arroyo
S. Sethumadhavan
4
0
0
27 Jul 2020
T-BFA: Targeted Bit-Flip Adversarial Weight Attack
T-BFA: Targeted Bit-Flip Adversarial Weight Attack
Adnan Siraj Rakin
Zhezhi He
Jingtao Li
Fan Yao
C. Chakrabarti
Deliang Fan
AAML
12
13
0
24 Jul 2020
A New Doctrine for Hardware Security
A New Doctrine for Hardware Security
A. Hastings
S. Sethumadhavan
11
11
0
18 Jul 2020
NeuroAttack: Undermining Spiking Neural Networks Security through
  Externally Triggered Bit-Flips
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips
Valerio Venceslai
Alberto Marchisio
Ihsen Alouani
Maurizio Martina
Muhammad Shafique
AAML
6
34
0
16 May 2020
Physical Security in the Post-quantum Era: A Survey on Side-channel
  Analysis, Random Number Generators, and Physically Unclonable Functions
Physical Security in the Post-quantum Era: A Survey on Side-channel Analysis, Random Number Generators, and Physically Unclonable Functions
Sreeja Chowdhury
Ana V. Čović
R. Acharya
Spencer Dupee
F. Ganji
Domenic Forte
11
31
0
09 May 2020
A Survey on Impact of Transient Faults on BNN Inference Accelerators
A Survey on Impact of Transient Faults on BNN Inference Accelerators
N. Khoshavi
Connor Broyles
Yu Bi
19
8
0
10 Apr 2020
FT-CNN: Algorithm-Based Fault Tolerance for Convolutional Neural
  Networks
FT-CNN: Algorithm-Based Fault Tolerance for Convolutional Neural Networks
Kai Zhao
Sheng Di
Sihuan Li
Xin Liang
Yujia Zhai
Jieyang Chen
Kaiming Ouyang
Franck Cappello
Zizhong Chen
14
80
0
27 Mar 2020
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based
  Side Channel Attacks
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based Side Channel Attacks
Sharjeel Khan
Girish Mururu
S. Pande
9
6
0
08 Mar 2020
TeleHammer: A Formal Model of Implicit Rowhammer
TeleHammer: A Formal Model of Implicit Rowhammer
Zhi-Li Zhang
Yueqiang Cheng
Dongxi Liu
Surya Nepal
Zhi Wang
11
6
0
06 Dec 2019
ReD-CaNe: A Systematic Methodology for Resilience Analysis and Design of
  Capsule Networks under Approximations
ReD-CaNe: A Systematic Methodology for Resilience Analysis and Design of Capsule Networks under Approximations
Alberto Marchisio
Vojtěch Mrázek
Muhammad Abdullah Hanif
Muhammad Shafique
AAML
6
15
0
02 Dec 2019
Using Name Confusion to Enhance Security
Using Name Confusion to Enhance Security
M. T. I. Ziad
Miguel A. Arroyo
Evgeny Manzhosov
V. Kemerlis
S. Sethumadhavan
15
0
0
05 Nov 2019
ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block
  Ciphers
ExplFrame: Exploiting Page Frame Cache for Fault Analysis of Block Ciphers
Anirban Chakraborty
Sarani Bhattacharya
Sayandeep Saha
Debdeep Mukhopadhyay
19
9
0
30 May 2019
PACStack: an Authenticated Call Stack
PACStack: an Authenticated Call Stack
Hans Liljestrand
Thomas Nyman
Lachlan J. Gunn
Jan-Erik Ekberg
Nadarajah Asokan
17
51
0
24 May 2019
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved
  Security
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security
André Schaller
Wenjie Xiong
Nikolaos Athanasios Anagnostopoulos
Muhammad Umair Saleem
Sebastian Gabmeyer
Stefan Katzenbeisser
Jakub Szefer
8
61
0
12 Feb 2019
CATTmew: Defeating Software-only Physical Kernel Isolation
CATTmew: Defeating Software-only Physical Kernel Isolation
Yueqiang Cheng
Zhi-Li Zhang
Surya Nepal
Zhi Wang
16
16
0
20 Feb 2018
A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for
  Cache-Side-Channel Elimination in Clouds
A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds
Read Sprabery
Konstantin Evchenko
A. Raj
R. Bobba
Sibin Mohan
R. Campbell
26
10
0
31 Aug 2017
Previous
123