{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:13:08Z","timestamp":1767838388223,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304039","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"645-657","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells"],"prefix":"10.1145","author":[{"given":"Xin-Chuan","family":"Wu","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Timothy","family":"Sherwood","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Frederic T.","family":"Chong","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Yanjing","family":"Li","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DDR memory errors caused by Row Hammer","author":"Aichinger Barbara","unstructured":"Barbara Aichinger. 2015. DDR memory errors caused by Row Hammer. In HPEC. IEEE, 1--5."},{"key":"e_1_3_2_1_2_1","unstructured":"JEDEC Solid State Technology Association. 2012. DDR3SDRAM Specification."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872390"},{"key":"e_1_3_2_1_4_1","unstructured":"Raghu Bharadwaj. 2017. Mastering Linux Kernel Development .Birmingham : Packt Publishing."},{"key":"e_1_3_2_1_5_1","volume-title":"CHES (Lecture Notes in Computer Science)","author":"Bhattacharya Sarani","unstructured":"Sarani Bhattacharya and Debdeep Mukhopadhyay. 2016. Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis. In CHES (Lecture Notes in Computer Science), Vol. 9813. Springer, 602--624."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.63"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077084"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241200"},{"key":"e_1_3_2_1_10_1","volume-title":"Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation. CoRR","author":"Cheng Yueqiang","year":"2018","unstructured":"Yueqiang Cheng, Zhi Zhang, and Surya Nepal. 2018. Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation. CoRR, Vol. abs\/1802.07060 (2018)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307663"},{"key":"e_1_3_2_1_12_1","volume-title":"Another Flip in the Wall of Rowhammer Defenses. CoRR","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, and Yuval Yarom. 2017. Another Flip in the Wall of Rowhammer Defenses. CoRR, Vol. abs\/1710.00551 (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_14_1","volume-title":"Part","volume":"2","author":"Guide Part","year":"2011","unstructured":"Part Guide. 2011. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual. Volume 3B: System programming Guide, Part, Vol. 2 (2011)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1241601.1241618"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1557425"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665726"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3291168.3291220"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Jamie Liu Ben Jaiyen Yoongu Kim Chris Wilkerson and Onur Mutlu. 2013. An experimental study of data retention behavior in modern DRAM devices: implications for retention time profiling mechanisms. In ISCA. ACM 60--71. 10.1145\/2485922.2485928","DOI":"10.1145\/2485922.2485928"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337161"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Lei Liu Zehan Cui Mingjie Xing Yungang Bao Mingyu Chen and Chengyong Wu. 2012a. A software memory partition approach for eliminating bank-level interference in multicore systems. In PACT. ACM 367--376. 10.1145\/2370816.2370869","DOI":"10.1145\/2370816.2370869"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855096"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/559906"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3130379.3130643"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241139"},{"key":"e_1_3_2_1_29_1","unstructured":"Phoronix. 2016. https:\/\/www.phoronix-test-suite.com\/. Phoronix test suite."},{"key":"e_1_3_2_1_30_1","volume-title":"A new approach for rowhammer attacks","author":"Qiao Rui","unstructured":"Rui Qiao and Mark Seaborn. 2016. A new approach for rowhammer attacks. In HOST. IEEE Computer Society, 161--166."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241096"},{"key":"e_1_3_2_1_32_1","volume-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat","author":"Seaborn Mark","year":"2015","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat (2015), 7--9."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Patrick Simmons. 2011. Security through amnesia: a software-based solution to the cold boot attack on disk encryption. In ACSAC. ACM 73--82. 10.1145\/2076732.2076743","DOI":"10.1145\/2076732.2076743"},{"key":"e_1_3_2_1_34_1","first-page":"139","article-title":"Implementing SELinux as a Linux security module","volume":"1","author":"Smalley Stephen","year":"2001","unstructured":"Stephen Smalley, Chris Vance, and Wayne Salamon. 2001. Implementing SELinux as a Linux security module. NAI Labs Report, Vol. 1, 43 (2001), 139.","journal-title":"NAI Labs Report"},{"key":"e_1_3_2_1_35_1","first-page":"669","article-title":"Method and apparatus for defending against zero-day worm-based attacks","volume":"11","author":"Syversen Jason","year":"2008","unstructured":"Jason Syversen. 2008. Method and apparatus for defending against zero-day worm-based attacks. US Patent App. 11\/632,669.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/789090.790005"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241097"}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:14Z","timestamp":1750204394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":38,"alternative-id":["10.1145\/3297858.3304039","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304039","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}