{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:28:35Z","timestamp":1725708515951},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:00:00Z","timestamp":1691280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,6]],"date-time":"2023-08-06T00:00:00Z","timestamp":1691280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1109\/mwscas57524.2023.10405885","type":"proceedings-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T18:29:15Z","timestamp":1706725755000},"page":"1098-1102","source":"Crossref","is-referenced-by-count":0,"title":["Mitigation of Rowhammer Attack on DDR4 Memory: A Novel Multi-Table Frequent Element Algorithm Based Approach"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Sylvester","sequence":"first","affiliation":[{"name":"Tennessee Technological University,Electrical and Computer Engineering,Cookeville,TN,USA"}]},{"given":"Jonathan","family":"Sandersan","sequence":"additional","affiliation":[{"name":"Tennessee Technological University,Electrical and Computer Engineering,Cookeville,TN,USA"}]},{"given":"Syed Rafay","family":"Hasan","sequence":"additional","affiliation":[{"name":"Tennessee Technological University,Electrical and Computer Engineering,Cookeville,TN,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2964791.2901453"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(82)90012-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116219"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3498337"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2018.00031"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw51379.2020.00102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480069"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218599"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3124728"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00059"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3569562.3569563"},{"key":"ref15","first-page":"117","article-title":"Cant touch this: Software-only mitigation against rowhammer attacks targeting kernel memory","volume-title":"26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada","author":"Brasser","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2021.3102004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID2022.2022.00053"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495576"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ATS47505.2019.00016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774703"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3391891"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81645-2_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3206729"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00090"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2014.6844484"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3445969.3450425"},{"key":"ref28","first-page":"1","article-title":"Concurrent weight encoding-based detection for bit-flip attack on neural network accelerators","volume-title":"2020 IEEE\/ACM International Conference On Computer Aided Design (IC-CAD)","author":"Liu","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11693017_28"},{"journal-title":"Zynq ultrascale+ mpsoc zcul04 evaluation kit","key":"ref30"},{"journal-title":"Antmicro rowhammer tester","key":"ref31","article-title":"AntMicro"}],"event":{"name":"2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS)","start":{"date-parts":[[2023,8,6]]},"location":"Tempe, AZ, USA","end":{"date-parts":[[2023,8,9]]}},"container-title":["2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10405424\/10405847\/10405885.pdf?arnumber=10405885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:10:33Z","timestamp":1706832633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10405885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/mwscas57524.2023.10405885","relation":{},"subject":[],"published":{"date-parts":[[2023,8,6]]}}}