{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:34:39Z","timestamp":1772724879559,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,12]],"date-time":"2021-12-12T00:00:00Z","timestamp":1639267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,12]],"date-time":"2021-12-12T00:00:00Z","timestamp":1639267200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,12]]},"DOI":"10.1109\/host49136.2021.9702274","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T06:21:12Z","timestamp":1644906072000},"page":"239-247","source":"Crossref","is-referenced-by-count":5,"title":["TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection"],"prefix":"10.1109","author":[{"given":"Yichen","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Huifeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}]},{"given":"Haoqi","family":"Shan","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Xiaolong","family":"Guo","sequence":"additional","affiliation":[{"name":"Kansas State University"}]},{"given":"Xuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis"}]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Can't touch this: Software-only mitigation against rowhammer attacks targeting kernel memory","author":"brasser","year":"0","journal-title":"9th Usenix Security Sympo-sium"},{"key":"ref11","author":"crawford","year":"2016","journal-title":"Techniques for probabilistic dynamic random access memory row repair"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00022"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"ref15","first-page":"300","article-title":"Rowhammer. js: A remote software-induced fault attack in javascript","author":"gruss","year":"0","journal-title":"Interna tional Conference on Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref17","first-page":"697","article-title":"Zebram: comprehensive and compatible software protection against rowhammer attacks","author":"konoth","year":"0","journal-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)"},{"key":"ref18","first-page":"213","article-title":"Throwhammer: Rowhammer attacks over the network and defenses","author":"tatar","year":"0","journal-title":"2018 (USENIX) Annual Technical Conference"},{"key":"ref19","first-page":"565","article-title":"Drama: Exploiting dram addressing for cross-cpu attacks","author":"pessl","year":"0","journal-title":"25th (USENIX) Security Symposium ((USENIX) Security 16)"},{"key":"ref4","article-title":"Exploiting the dram rowhammer bug to gain kernel privileges","volume":"15","author":"seaborn","year":"2015","journal-title":"Black Hat"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1145\/2678373.2665726","article-title":"Flipping bits in mem ory without accessing them: An experimental study of dram disturbance errors","volume":"42","author":"kim","year":"2014","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"ref5","first-page":"19","article-title":"One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation","author":"xiao","year":"0","journal-title":"25th (USENIX) Security Symposium ((USENIX) Security 16)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266454"},{"key":"ref7","first-page":"1675","article-title":"Drammer: Deterministic rowhammer attacks on mobile plat forms","author":"van der veen","year":"0","journal-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"ref1","author":"specification","year":"0","journal-title":"Jedec &#x201C;jesd209-4 lpddr4 specification &#x201D; 2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872390"}],"event":{"name":"2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2021,12,12]]},"end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9702149\/9702266\/09702274.pdf?arnumber=9702274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T23:13:42Z","timestamp":1653952422000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9702274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/host49136.2021.9702274","relation":{},"subject":[],"published":{"date-parts":[[2021,12,12]]}}}