{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:53Z","timestamp":1772164073077,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T00:00:00Z","timestamp":1458864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Center for Future Architectures Research (C-FAR)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2872362.2872390","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"743-755","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["ANVIL"],"prefix":"10.1145","author":[{"given":"Zelalem Birhanu","family":"Aweke","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Salessawi Ferede","family":"Yitbarek","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor , MI, USA"}]},{"given":"Rui","family":"Qiao","sequence":"additional","affiliation":[{"name":"Stony Brook University, New York , NY, USA"}]},{"given":"Reetuparna","family":"Das","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor , MI, USA"}]},{"given":"Matthew","family":"Hicks","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Yossi","family":"Oren","sequence":"additional","affiliation":[{"name":"Ben-Gurion University of the Negev, Beersheba, Israel"}]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor , MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/twitter.com\/lavados\/status\/685618703413698562. Accessed: 2016-01--21.  https:\/\/twitter.com\/lavados\/status\/685618703413698562. Accessed: 2016-01--21."},{"key":"e_1_3_2_1_2_1","unstructured":"Program for Testing for the DRAM \"rowhammer\" Problem. https:\/\/github.com\/mseaborn\/rowhammer-test. Accessed: 2015-08--11.  Program for Testing for the DRAM \"rowhammer\" Problem. https:\/\/github.com\/mseaborn\/rowhammer-test. Accessed: 2015-08--11."},{"key":"e_1_3_2_1_3_1","unstructured":"National Security Agency. TEMPEST: A Signal Problem. https:\/\/www.nsa.gov\/public_info\/_files\/cryptologic_spectrum\/tempest.pdf. Accessed: 2015-08--11.  National Security Agency. TEMPEST: A Signal Problem. https:\/\/www.nsa.gov\/public_info\/_files\/cryptologic_spectrum\/tempest.pdf. Accessed: 2015-08--11."},{"key":"e_1_3_2_1_4_1","unstructured":"JEDEC Solid State Technology Association. DDR3 SDRAM Specification 2010.  JEDEC Solid State Technology Association. DDR3 SDRAM Specification 2010."},{"key":"e_1_3_2_1_5_1","unstructured":"K. Bains J.B. Halbert C.P. Mozak T.Z. Schoenborn and Z. Greenfield. Row Hammer Refresh Command 2014.  K. Bains J.B. Halbert C.P. Mozak T.Z. Schoenborn and Z. Greenfield. Row Hammer Refresh Command 2014."},{"key":"e_1_3_2_1_6_1","first-page":"64","article-title":"DRAM Refresh Mechanisms, Penalties, and Trade-Offs. In","author":"Bhati Ishwar","year":"2015","journal-title":"IEEE Transactions on Computers, VOL."},{"key":"e_1_3_2_1_7_1","unstructured":"Paul J. Drongowski. Instruction-Based Sampling: A New Performance Analysis Technique for AMD Family 10h Processors. 2007.  Paul J. Drongowski. Instruction-Based Sampling: A New Performance Analysis Technique for AMD Family 10h Processors. 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D. Gruss C. Maurice and S. Mangard. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. ArXiv e-prints July 2015.  D. Gruss C. Maurice and S. Mangard. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. ArXiv e-prints July 2015.","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_9_1","volume-title":"Henning. SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News, 34(4):1--17","author":"John","year":"2006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.18"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228543"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_13_1","unstructured":"Apple Inc. About the Security Content of Mac EFI Security Update 2015-001 . https:\/\/support.apple.com\/en-us\/HT204934. Accessed: 2015-08--11.  Apple Inc. About the Security Content of Mac EFI Security Update 2015-001 . https:\/\/support.apple.com\/en-us\/HT204934. Accessed: 2015-08--11."},{"key":"e_1_3_2_1_14_1","unstructured":"CISCO Inc. Mitigations Available for the DRAM Row Hammer Vulnerability. http:\/\/blogs.cisco.com\/security\/mitigations-available-for-the-dram-row-hammer-vulnerability.  CISCO Inc. Mitigations Available for the DRAM Row Hammer Vulnerability. http:\/\/blogs.cisco.com\/security\/mitigations-available-for-the-dram-row-hammer-vulnerability."},{"key":"e_1_3_2_1_15_1","first-page":"05","author":"Inc HP","year":"2015","journal-title":"HP Moonshot Component Pack Version"},{"key":"e_1_3_2_1_16_1","unstructured":"Intel Inc. Intel 64 and IA-32 Architectures Optimization Reference Manual. September 2014.  Intel Inc. Intel 64 and IA-32 Architectures Optimization Reference Manual. September 2014."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel Inc. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual Volume 3 (3A 3B & 3C): System Programming Guide. June 2015.  Intel Inc. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual Volume 3 (3A 3B & 3C): System Programming Guide. June 2015."},{"key":"e_1_3_2_1_18_1","unstructured":"Lenovo Inc. Row Hammer Privilege Escalation Lenovo Security Advisory: LEN-2015-009. https:\/\/support.lenovo.com\/us\/en\/product_security\/row_hammer. Accessed: 2015-08--11.  Lenovo Inc. Row Hammer Privilege Escalation Lenovo Security Advisory: LEN-2015-009. https:\/\/support.lenovo.com\/us\/en\/product_security\/row_hammer. Accessed: 2015-08--11."},{"key":"e_1_3_2_1_19_1","unstructured":"Micron Inc. DDR4 SDRAM MT40A2G4 MT40A1G8 MT40A512M16 Data sheet. 2015.  Micron Inc. DDR4 SDRAM MT40A2G4 MT40A1G8 MT40A512M16 Data sheet. 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815971"},{"key":"e_1_3_2_1_21_1","unstructured":"JEDEC Solid State Technology Association . Low Power Double Data Rate 4 (LPDDR4) 2015.  JEDEC Solid State Technology Association . Low Power Double Data Rate 4 (LPDDR4) 2015."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224971"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2014.2332177"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665726"},{"key":"e_1_3_2_1_25_1","unstructured":"Mohsen Ghasempour Mikel Lujan and Jim Garside. Armor: A Run-Time Memory Hot-Row Detector. http:\/\/apt.cs.manchester.ac.uk\/projects\/ARMOR\/RowHammer\/index.html. Accessed: 2015-08--11.  Mohsen Ghasempour Mikel Lujan and Jim Garside. Armor: A Run-Time Memory Hot-Row Detector. http:\/\/apt.cs.manchester.ac.uk\/projects\/ARMOR\/RowHammer\/index.html. Accessed: 2015-08--11."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485927"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813708"},{"key":"e_1_3_2_1_28_1","unstructured":"Mark Seaborn and Thomas Dullien. Exploiting the DRAM rowhammer bug to gain kernel privileges. March 2015.  Mark Seaborn and Thomas Dullien. Exploiting the DRAM rowhammer bug to gain kernel privileges. March 2015."},{"key":"e_1_3_2_1_29_1","first-page":"719","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium, SEC'14","author":"Yarom Yuval","year":"2014"}],"event":{"name":"ASPLOS '16: Architectural Support for Programming Languages and Operating Systems","location":"Atlanta Georgia USA","acronym":"ASPLOS '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:39:16Z","timestamp":1750207156000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872390"}},"subtitle":["Software-Based Protection Against Next-Generation Rowhammer Attacks"],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":29,"alternative-id":["10.1145\/2872362.2872390","10.1145\/2872362"],"URL":"https:\/\/doi.org\/10.1145\/2872362.2872390","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2980024.2872390","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2954679.2872390","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}