{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T03:20:38Z","timestamp":1767842438946,"version":"3.49.0"},"reference-count":100,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1109\/vts65138.2025.11022861","type":"proceedings-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T17:48:39Z","timestamp":1749577719000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Revisiting DRAM Read Disturbance: Identifying Inconsistencies Between Experimental Characterization and Device-Level Studies"],"prefix":"10.1109","author":[{"given":"Haocong","family":"Luo","sequence":"first","affiliation":[{"name":"ETH Zurich"}]},{"given":"\u0130smail Emir","family":"Y\u00fcksel","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"Ataberk","family":"Olgun","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"A. Giray","family":"Ya\u011fl\u0131k\u00e7\u0131","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"Onur","family":"Mutlu","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]}],"member":"263","reference":[{"key":"ref1","first-page":"286","article-title":"Field-Effect Transistor Memory","volume-title":"U.S. Patent","author":"Dennard","year":"1968"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref3","article-title":"Revisiting RowHammer: An Experimental Analysis of Modern Devices and Mitigation Techniques","author":"Kim","year":"2020","journal-title":"ISCA"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480069"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00054"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589063"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA59077.2024.00083"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927156"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16350-1_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3566097.3568350"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2024.3409521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S60304.2024.00013"},{"key":"ref13","article-title":"Retrospective: Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors","author":"Mutlu","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58291.2024.00022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA61900.2025.00069"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics6030052"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00031"},{"key":"ref19","article-title":"Throwhammer: Rowhammer Attacks Over the Network and Defenses","author":"Tatar","year":"2018","journal-title":"USENIX ATC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00089"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494868"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266454"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1387-4_6"},{"key":"ref24","article-title":"Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges","author":"Seaborn","year":"2015"},{"key":"ref25","article-title":"RowHammer \u2014 GitHub Repository","author":"Research Group","year":"2021"},{"key":"ref26","article-title":"Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges","author":"Seaborn","year":"2015","journal-title":"Black Hat"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref28","article-title":"Flip Feng Shui: Hammering a Needle in the Software Stack","author":"Razavi","year":"2016","journal-title":"USENIX Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241139"},{"key":"ref30","article-title":"One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation","author":"Xiao","year":"2016","journal-title":"USENIX Security"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.63"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_29"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2905022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495576"},{"key":"ref35","article-title":"Can\u2019t Touch This: Software-Only Mitigation Against Rowhammer Attacks Targeting Kernel Memory","author":"Brasser","year":"2017","journal-title":"USENIX Security"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951730"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_3"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw51379.2020.00102"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00022"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329811"},{"key":"ref45","article-title":"Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks","author":"Hong","year":"2019","journal-title":"USENIX Security"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00085"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.169-195"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00016"},{"key":"ref51","article-title":"DeepHammer: Depleting the Intelligence of Deep Neural Networks Through Targeted Chain of Bit Flips","author":"Yao","year":"2020","journal-title":"USENIX Security"},{"key":"ref52","article-title":"SMASH: Synchronized Many-Sided Rowhammer Attacks from JavaScript","author":"De Ridder","year":"2021","journal-title":"USENIX Security"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480110"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833772"},{"key":"ref55","article-title":"Toward Realistic Backdoor Injection Attacks on DNNs using RowHammer","author":"Tol","year":"2022"},{"key":"ref56","article-title":"Half-Double: Hammering From the Next Row Over","author":"Kogler","year":"2022","journal-title":"USENIX Security"},{"key":"ref57","article-title":"SpyHammer: Using RowHammer to Remotely Spy on Temperature","author":"Orosa","year":"2022"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3214666"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3211411"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560688"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.00392"},{"key":"ref62","article-title":"When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer","author":"Jr","year":"2022","journal-title":"CCS"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833802"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-64171-8_24"},{"key":"ref66","article-title":"ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms","author":"Jattke","year":"2024","journal-title":"USENIX Security"},{"key":"ref67","article-title":"Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands","author":"De Ridder","year":"2025","journal-title":"USENIX Security"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2023.3298737"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00023"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179450"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom60117.2023.00144"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3669940.3707242"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM.2017.8268437"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2019.2891260"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2021.3060362"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS48203.2023.10117677"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TED.2024.3418300"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/LED.2023.3334763"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/IRPS48228.2024.10529371"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485928"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3282172"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.62"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080242"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2592000"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.30"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00034"},{"key":"ref87","article-title":"Revisiting DRAM Read Disturbance \u2014 GitHub Repository","author":"Research Group","year":"2025"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/4.34067"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544426"},{"key":"ref90","article-title":"DSAC: Low-Cost RowHammer Mitigation Using In-DRAM Stochastic and Approximate Counting Algorithm","author":"Hong","year":"2023"},{"key":"ref91","article-title":"DRAM Bender \u2014 GitHub Repository","author":"Research Group","year":"2022"},{"key":"ref92","volume-title":"SoftMC \u2014 GitHub Repository","year":"2021"},{"key":"ref93","volume-title":"FT20X"},{"key":"ref94","year":"2020","journal-title":"JESD79-4C: DDR4 SDRAM Standard"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/4.766820"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2011.2157741"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/81.989159"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2010.5433892"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.microrel.2015.12.027"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-7487-7_7"}],"event":{"name":"2025 IEEE 43rd VLSI Test Symposium (VTS)","location":"Tempe, AZ, USA","start":{"date-parts":[[2025,4,28]]},"end":{"date-parts":[[2025,4,30]]}},"container-title":["2025 IEEE 43rd VLSI Test Symposium (VTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11022705\/11022774\/11022861.pdf?arnumber=11022861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:15:41Z","timestamp":1749618941000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11022861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":100,"URL":"https:\/\/doi.org\/10.1109\/vts65138.2025.11022861","relation":{},"subject":[],"published":{"date-parts":[[2025,4,28]]}}}