{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:44:51Z","timestamp":1773193491303,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/irps48227.2022.9764591","type":"proceedings-article","created":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T20:44:23Z","timestamp":1651524263000},"page":"2C.3-1-2C.3-6","source":"Crossref","is-referenced-by-count":24,"title":["The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Saroiu","sequence":"first","affiliation":[{"name":"Microsoft"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alec","family":"Wolman","sequence":"additional","affiliation":[{"name":"Microsoft"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lucian","family":"Cojocar","sequence":"additional","affiliation":[{"name":"Microsoft"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Reinforce Memory Error Protection by Breaking DRAM Disturbance Correlation Within ECC Words","author":"wang","year":"2019","journal-title":"ICCD"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2019.2897299"},{"key":"ref33","article-title":"Graphene: Strong yet Lightweight Row Hammer Protection","author":"park","year":"2020","journal-title":"Micro"},{"key":"ref32","article-title":"A Deeper Look into RowHammer's Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses","author":"orosa","year":"2021","journal-title":"Micro"},{"key":"ref31","article-title":"RowHammer: A Retrospective","author":"mutlu","year":"2019","journal-title":"TCAD"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16350-1_1"},{"key":"ref37","article-title":"The TurboCATS III-2667ST Memory Test System","year":"2019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062281"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00057"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2016.2614497"},{"key":"ref10","article-title":"ARMOR: A Run-Time Memory Hot-Row Detector","author":"ghasempour","year":"2015"},{"key":"ref40","article-title":"BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows","author":"yagl?k\u00e7?","year":"2021","journal-title":"HPCA"},{"key":"ref11","article-title":"Row Hammering: What it is, and how hackers could use it to gain access to your system","author":"greenberg","year":"2015"},{"key":"ref12","article-title":"Method, Apparatus and System for Determining a Count of Accesses to a Row of Memory","author":"greenfield","year":"2014","journal-title":"Patent Applied for"},{"key":"ref13","article-title":"Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications","author":"hassan","year":"2021","journal-title":"Micro"},{"key":"ref14","article-title":"Black-smith: Scalable Rowhammering in the Frequency Domain","author":"jattke","year":"2022","journal-title":"IEEE S&P"},{"key":"ref15","year":"2019","journal-title":"DDR4 Register Clock Driver Definition (DDR4RCD02)"},{"key":"ref16","year":"2019","journal-title":"Serial Presence Detect (SPD) General Standard"},{"key":"ref17","year":"2020","journal-title":"Double Data Rate 5 (DDR5) SDRAM Standard"},{"key":"ref18","year":"2021","journal-title":"Near-Term DRAM Level Rowhammer Mitigation (JEP300-1)"},{"key":"ref19","year":"2021","journal-title":"System Level Rowhammer Mitigation (JEP301-1)"},{"key":"ref28","article-title":"Techniques for Determining Victim Row Addresses in a Volatile Memory","author":"mandava","year":"2016","journal-title":"Patent"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ATS47505.2019.00016"},{"key":"ref27","article-title":"Handling Maximum Activation Count Limit and Target Row Refresh in DDR4 SDRAM","author":"lin","year":"2015","journal-title":"Patent"},{"key":"ref3","article-title":"Row Hammer Refresh Command","author":"bains","year":"2014","journal-title":"Patent"},{"key":"ref6","article-title":"mFIT: A Bump-in-the-Wire Tool for Plug-and-Play Analysis of Rowhammer Susceptibility Factors","volume":"msr tr 2021 25","author":"cojocar","year":"2021","journal-title":"Technical Report &#x2013; Microsoft Research"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927156"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00085"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"ref7","article-title":"SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript","author":"de ridder","year":"2021","journal-title":"Usenix Security"},{"key":"ref2","article-title":"Row Hammer Monitoring Based on Stored Row Hammer Threshold Value","author":"bains","year":"2015","journal-title":"Patent"},{"key":"ref9","article-title":"JEDEC DDR4 Revision B Spec: What's different?","year":"2017"},{"key":"ref1","article-title":"Distributed Row Hammer Tracking","author":"bains","year":"2014","journal-title":"Patent Applied for"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2014.2332177"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00059"},{"key":"ref24","article-title":"TWiCe: Preventing Rowhammering by Exploiting Time Window Counters","author":"lee","year":"2019","journal-title":"ISCA"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317866"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2787674"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00090"},{"key":"ref25","article-title":"Green Memory Solution","author":"lee","year":"2014"}],"event":{"name":"2022 IEEE International Reliability Physics Symposium (IRPS)","location":"Dallas, TX, USA","start":{"date-parts":[[2022,3,27]]},"end":{"date-parts":[[2022,3,31]]}},"container-title":["2022 IEEE International Reliability Physics Symposium (IRPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9764406\/9764408\/09764591.pdf?arnumber=9764591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:14:15Z","timestamp":1655154855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9764591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/irps48227.2022.9764591","relation":{},"subject":[],"published":{"date-parts":[[2022,3]]}}}