{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:02:20Z","timestamp":1730224940312,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545410","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"349-360","source":"Crossref","is-referenced-by-count":0,"title":["Rowhammer Cache: A Last-Level Cache for Low-Overhead Rowhammer Tracking"],"prefix":"10.1109","author":[{"given":"Aman","family":"Singh","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bombay and the University of Illinois,Urbana-Champaign"}]},{"given":"Biswabandan","family":"Panda","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology,Bombay,India"}]}],"member":"263","reference":[{"volume-title":"Utahsim Documentation","year":"2012","key":"ref1"},{"volume-title":"Utahsim simulator","year":"2012","key":"ref2"},{"volume-title":"The 2nd data prefetching championship (dpc-2)","year":"2015","key":"ref3"},{"volume-title":"The 3rd data prefetching championship (dpc-3)","year":"2019","key":"ref4"},{"volume-title":"SPEC CPU 2017 traces for champsim","year":"2019","key":"ref5"},{"volume-title":"ChampSim simulator","year":"2020","key":"ref6"},{"volume-title":"GAP traces for champsim","year":"2021","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00053"},{"key":"ref9","first-page":"110","article-title":"Panopticon: A complete in-dram rowhammer mitigation","volume-title":"Workshop on DRAM Security (DRAMSec)","volume":"22","author":"Bennett","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322207"},{"volume-title":"Amd epyc 7702","year":"2019","author":"EPYC","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS55109.2022.00045"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"volume-title":"Throttling support for row-hammer counters","year":"2016","author":"Greenfield","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2018.00031"},{"key":"ref16","first-page":"300","article-title":"Rowhammer.js: A remote software-induced fault attack in javascript","volume-title":"Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","volume":"9721","author":"Gruss","year":"2016"},{"key":"ref17","first-page":"300","article-title":"Rowhammer.js: A remote software-induced fault attack in javascript","volume-title":"Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","volume":"9721","author":"Gruss","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1816038.1815971"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2021.3117005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967217"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2014.2332177"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322232"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2023.3320670"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2020.2973991"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927156"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00072"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614245"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.092"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527421"},{"journal-title":"Amd ryzen threadripper","year":"2019","author":"Ryzen","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507716"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00049"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00048"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379244"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062281"},{"key":"ref42","first-page":"374","article-title":"Scalable and secure row-swap: Efficient and safe row hammer mitigation in memory systems","volume-title":"IEEE International Symposium on High-Performance Computer Architecture","volume":"HPCA 2023","author":"Woo","year":"2023"},{"journal-title":"Xeon platinum","year":"2023","author":"Xeon","key":"ref43"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00037"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/hpca51647.2021.00037"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3316781.3317866","article-title":"Mrloc: Mitigating row-hammering based on memory locality","volume-title":"Proceedings of the 56th Annual Design Automation Conference 2019","author":"You","year":"2019"},{"key":"ref47","first-page":"28","article-title":"Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses","volume-title":"2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)","author":"Zhang"}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2024,5,6]]},"location":"Tysons Corner, VA, USA","end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545410.pdf?arnumber=10545410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T04:14:34Z","timestamp":1717906474000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545410","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}