{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:52:14Z","timestamp":1774965134279,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":175,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE 1256260"],"award-info":[{"award-number":["DGE 1256260"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["PhD Fellowship"],"award-info":[{"award-number":["PhD Fellowship"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["Expeditionary Cyber Grant"],"award-info":[{"award-number":["Expeditionary Cyber Grant"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1145\/3600006.3613143","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T14:44:17Z","timestamp":1696344257000},"page":"417-433","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4647-3201","authenticated-orcid":false,"given":"Kevin","family":"Loughlin","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4755-9575","authenticated-orcid":false,"given":"Jonah","family":"Rosenblum","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1318-1719","authenticated-orcid":false,"given":"Stefan","family":"Saroiu","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3484-7360","authenticated-orcid":false,"given":"Alec","family":"Wolman","sequence":"additional","affiliation":[{"name":"Microsoft, Redmond, Washington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0289-5499","authenticated-orcid":false,"given":"Dimitrios","family":"Skarlatos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6122-8998","authenticated-orcid":false,"given":"Baris","family":"Kasikci","sequence":"additional","affiliation":[{"name":"University of Washington and Google, Seattle, Washington, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Diana-Maria Popa. Firecracker: Lightweight Virtualization for Serverless Applications. In USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Agache Alexandru","year":"2020","unstructured":"Alexandru Agache , Marc Brooker , Alexandra Iordache , Anthony Liguori , Rolf Neugebauer , Phil Piwonka , and Diana-Maria Popa. Firecracker: Lightweight Virtualization for Serverless Applications. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2020 . Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa. Firecracker: Lightweight Virtualization for Serverless Applications. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2020."},{"key":"e_1_3_2_1_2_1","volume-title":"Francisco Torres-Reyes. Towards Understanding Application Performance and System Behavior with the Full Dynticks Feature. In IEEE Computing and Communication Workshop and Conference (CCWC)","author":"Aljuhni Abdullah","year":"2018","unstructured":"Abdullah Aljuhni , C Edward Chow , Amer Aljaedi , Shaji Yusuf , and Francisco Torres-Reyes. Towards Understanding Application Performance and System Behavior with the Full Dynticks Feature. In IEEE Computing and Communication Workshop and Conference (CCWC) , 2018 . Abdullah Aljuhni, C Edward Chow, Amer Aljaedi, Shaji Yusuf, and Francisco Torres-Reyes. Towards Understanding Application Performance and System Behavior with the Full Dynticks Feature. In IEEE Computing and Communication Workshop and Conference (CCWC), 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"AMD Secure Encrypted Virtualization (SEV)","author":"AMD.","year":"2020","unstructured":"AMD. AMD Secure Encrypted Virtualization (SEV) , 2020 . https:\/\/developer.amd.com\/sev\/. AMD. AMD Secure Encrypted Virtualization (SEV), 2020. https:\/\/developer.amd.com\/sev\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED.2009.4810274"},{"key":"e_1_3_2_1_5_1","volume-title":"ACM SIGARCH Computer Architecture News (CAN)","author":"Aweke Zelalem Birhanu","year":"2016","unstructured":"Zelalem Birhanu Aweke , Salessawi Ferede Yitbarek , Rui Qiao , Reetuparna Das , Matthew Hicks , Yossi Oren , and Todd Austin . ANVIL : Software-Based Protection Against Next-Generation Rowhammer Attacks . In ACM SIGARCH Computer Architecture News (CAN) , 2016 . Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Rui Qiao, Reetuparna Das, Matthew Hicks, Yossi Oren, and Todd Austin. ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. In ACM SIGARCH Computer Architecture News (CAN), 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"Row Hammer Refresh Command","author":"Bains Kuljit","year":"2015","unstructured":"Kuljit Bains , John Halbert , Christopher Mozak , Theodore Schoenborn , and Zvika Greenfield . Row Hammer Refresh Command , 2015 . US Patent 9,117,544. Kuljit Bains, John Halbert, Christopher Mozak, Theodore Schoenborn, and Zvika Greenfield. Row Hammer Refresh Command, 2015. US Patent 9,117,544."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071066"},{"key":"e_1_3_2_1_8_1","volume-title":"Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference (ATC)","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . QEMU , a Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference (ATC) , 2005 . Fabrice Bellard. QEMU, a Fast and Portable Dynamic Translator. In USENIX Annual Technical Conference (ATC), 2005."},{"key":"e_1_3_2_1_9_1","volume-title":"Lucian Cojocar. Panopticon: A Complete In-DRAM Rowhammer Mitigation. In Workshop on DRAM Security (DRAMSec)","author":"Bennett Tanj","year":"2021","unstructured":"Tanj Bennett , Stefan Saroiu , Alec Wolman , and Lucian Cojocar. Panopticon: A Complete In-DRAM Rowhammer Mitigation. In Workshop on DRAM Security (DRAMSec) , 2021 . Tanj Bennett, Stefan Saroiu, Alec Wolman, and Lucian Cojocar. Panopticon: A Complete In-DRAM Rowhammer Mitigation. In Workshop on DRAM Security (DRAMSec), 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"Kai Li. The PARSEC Benchmark Suite: Characterization and Architectural Implications. In IEEE International Conference on Parallel Architectures and Compilation Techniques (PACT)","author":"Bienia Christian","year":"2008","unstructured":"Christian Bienia , Sanjeev Kumar , Jaswinder Pal Singh , and Kai Li. The PARSEC Benchmark Suite: Characterization and Architectural Implications. In IEEE International Conference on Parallel Architectures and Compilation Techniques (PACT) , 2008 . Christian Bienia, Sanjeev Kumar, Jaswinder Pal Singh, and Kai Li. The PARSEC Benchmark Suite: Characterization and Architectural Implications. In IEEE International Conference on Parallel Architectures and Compilation Techniques (PACT), 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"Ahamd-Reza Sadeghi. RIP-RH: Preventing Rowhammer-Based Inter-Process Attacks. In ACM Asia Conference on Computer and Communications Security (Asia CCS)","author":"Bock Carsten","year":"2019","unstructured":"Carsten Bock , Ferdinand Brasser , David Gens , Christopher Liebchen , and Ahamd-Reza Sadeghi. RIP-RH: Preventing Rowhammer-Based Inter-Process Attacks. In ACM Asia Conference on Computer and Communications Security (Asia CCS) , 2019 . Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, and Ahamd-Reza Sadeghi. RIP-RH: Preventing Rowhammer-Based Inter-Process Attacks. In ACM Asia Conference on Computer and Communications Security (Asia CCS), 2019."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Lucas Davi , David Gens , Christopher Liebchen , and Ahmad-Reza Sadeghi . C An't Touch This : Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory . In USENIX Security Symposium (USENIX Security) , 2017 . Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, and Ahmad-Reza Sadeghi. CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory. In USENIX Security Symposium (USENIX Security), 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Kistowski. SPEC CPU2017: Next-Generation Compute Benchmark. In Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering","author":"Bucek James","year":"2018","unstructured":"James Bucek , Klaus-Dieter Lange , and J\u00f3akim v. Kistowski. SPEC CPU2017: Next-Generation Compute Benchmark. In Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering , 2018 . James Bucek, Klaus-Dieter Lange, and J\u00f3akim v. Kistowski. SPEC CPU2017: Next-Generation Compute Benchmark. In Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering, 2018."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2505464"},{"key":"e_1_3_2_1_15_1","volume-title":"Los Alamos National Lab.","author":"Carlton Michael Andrew","year":"2014","unstructured":"Michael Andrew Carlton , Sean P Blanchard , and Nathan A Debardeleben . Improving Memory Error Handling Using Linux. Technical report , Los Alamos National Lab. , 2014 . Michael Andrew Carlton, Sean P Blanchard, and Nathan A Debardeleben. Improving Memory Error Handling Using Linux. Technical report, Los Alamos National Lab., 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.1999.744334"},{"key":"e_1_3_2_1_17_1","volume-title":"Debdeep Mukhopadhyay. Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips. In IEEE Asian Test Symposium (ATS)","author":"Chakraborty Anirban","year":"2019","unstructured":"Anirban Chakraborty , Manaar Alam , and Debdeep Mukhopadhyay. Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips. In IEEE Asian Test Symposium (ATS) , 2019 . Anirban Chakraborty, Manaar Alam, and Debdeep Mukhopadhyay. Deep Learning Based Diagnostics for Rowhammer Protection of DRAM Chips. In IEEE Asian Test Symposium (ATS), 2019."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446095"},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Kai-Wei Chang Kevin","year":"2014","unstructured":"Kevin Kai-Wei Chang , Donghyuk Lee , Zeshan Chishti , Alaa R Alameldeen , Chris Wilkerson , Yoongu Kim , and Onur Mutlu . Improving DRAM Performance by Parallelizing Refreshes with Accesses . In IEEE International Symposium on High Performance Computer Architecture (HPCA) , 2014 . Kevin Kai-Wei Chang, Donghyuk Lee, Zeshan Chishti, Alaa R Alameldeen, Chris Wilkerson, Yoongu Kim, and Onur Mutlu. Improving DRAM Performance by Parallelizing Refreshes with Accesses. In IEEE International Symposium on High Performance Computer Architecture (HPCA), 2014."},{"key":"e_1_3_2_1_20_1","volume-title":"Intel TDX Demystified: A Top-Down Approach. arXiv preprint arXiv:2303.15540","author":"Cheng Pau-Chen","year":"2023","unstructured":"Pau-Chen Cheng , Wojciech Ozga , Enriquillo Valdez , Salman Ahmed , Zhongshu Gu , Hani Jamjoom , Hubertus Franke , and James Bottomley . Intel TDX Demystified: A Top-Down Approach. arXiv preprint arXiv:2303.15540 , 2023 . Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, and James Bottomley. Intel TDX Demystified: A Top-Down Approach. arXiv preprint arXiv:2303.15540, 2023."},{"key":"e_1_3_2_1_21_1","volume-title":"ACM Computing Surveys (CSUR)","author":"Cho Keewon","year":"2016","unstructured":"Keewon Cho , Wooheon Kang , Hyungjun Cho , Changwook Lee , and Sungho Kang . A Survey of Repair Analysis Algorithms for Memories . ACM Computing Surveys (CSUR) , 2016 . Keewon Cho, Wooheon Kang, Hyungjun Cho, Changwook Lee, and Sungho Kang. A Survey of Repair Analysis Algorithms for Memories. ACM Computing Surveys (CSUR), 2016."},{"key":"e_1_3_2_1_22_1","volume-title":"Yuval Yarom. HammerScope: Observing DRAM Power Consumption Using Rowhammer. In ACM SIGSAC Conference on Computer and Communications Security (CCS)","author":"Cohen Yaakov","year":"2022","unstructured":"Yaakov Cohen , Kevin Sam Tharayil , Arie Haenel , Daniel Genkin , Angelos D Keromytis , Yossi Oren , and Yuval Yarom. HammerScope: Observing DRAM Power Consumption Using Rowhammer. In ACM SIGSAC Conference on Computer and Communications Security (CCS) , 2022 . Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D Keromytis, Yossi Oren, and Yuval Yarom. HammerScope: Observing DRAM Power Consumption Using Rowhammer. In ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022."},{"key":"e_1_3_2_1_23_1","volume-title":"An End-to-End Methodology for Cloud Providers. In IEEE Symposium on Security and Privacy (S&P)","author":"Cojocar Lucian","year":"2020","unstructured":"Lucian Cojocar , Jeremie Kim , Minesh Patel , Lillian Tsai , Stefan Saroiu , Alec Wolman , and Onur Mutlu . Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. In IEEE Symposium on Security and Privacy (S&P) , 2020 . Lucian Cojocar, Jeremie Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, and Onur Mutlu. Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. In IEEE Symposium on Security and Privacy (S&P), 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"Herbert Bos. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. In IEEE Symposium on Security and Privacy (S&P)","author":"Cojocar Lucian","year":"2019","unstructured":"Lucian Cojocar , Kaveh Razavi , Cristiano Giuffrida , and Herbert Bos. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. In IEEE Symposium on Security and Privacy (S&P) , 2019 . Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, and Herbert Bos. Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. In IEEE Symposium on Security and Privacy (S&P), 2019."},{"key":"e_1_3_2_1_26_1","volume-title":"Russell Sears. Benchmarking Cloud Serving Systems with YCSB. In ACM symposium on Cloud computing","author":"Cooper Brian F","year":"2010","unstructured":"Brian F Cooper , Adam Silberstein , Erwin Tam , Raghu Ramakrishnan , and Russell Sears. Benchmarking Cloud Serving Systems with YCSB. In ACM symposium on Cloud computing , 2010 . Brian F Cooper, Adam Silberstein, Erwin Tam, Raghu Ramakrishnan, and Russell Sears. Benchmarking Cloud Serving Systems with YCSB. In ACM symposium on Cloud computing, 2010."},{"key":"e_1_3_2_1_27_1","volume-title":"Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . Intel SGX Explained. Cryptology ePrint Archive , 2016 . Victor Costan and Srinivas Devadas. Intel SGX Explained. Cryptology ePrint Archive, 2016."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium (USENIX Security)","author":"de Ridder Finn","year":"2021","unstructured":"Finn de Ridder , Pietro Frigo , Emanuele Vannacci , Herbert Bos , Cristiano Giuffrida , and Kaveh Razavi . SMASH : Synchronized Many-sided Rowhammer Attacks from JavaScript . In USENIX Security Symposium (USENIX Security) , 2021 . Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, and Kaveh Razavi. SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. In USENIX Security Symposium (USENIX Security), 2021."},{"key":"e_1_3_2_1_29_1","volume-title":"Mengjia Yan. DAGguise: Mitigating Memory Timing Side Channels. In International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Deutsch Peter W","year":"2022","unstructured":"Peter W Deutsch , Yuheng Yang , Thomas Bourgeat , Jules Drean , Joel S Emer , and Mengjia Yan. DAGguise: Mitigating Memory Timing Side Channels. In International Conference on Architectural Support for Programming Languages and Operating Systems , 2022 . Peter W Deutsch, Yuheng Yang, Thomas Bourgeat, Jules Drean, Joel S Emer, and Mengjia Yan. DAGguise: Mitigating Memory Timing Side Channels. In International Conference on Architectural Support for Programming Languages and Operating Systems, 2022."},{"key":"e_1_3_2_1_30_1","volume-title":"The Memory API. qemu.readthedocs.io\/en\/latest\/devel\/memory.html","author":"Project Developers The QEMU","year":"2022","unstructured":"The QEMU Project Developers . The Memory API. qemu.readthedocs.io\/en\/latest\/devel\/memory.html , 2022 . The QEMU Project Developers. The Memory API. qemu.readthedocs.io\/en\/latest\/devel\/memory.html, 2022."},{"key":"e_1_3_2_1_31_1","volume-title":"Cristiano Giuffrida. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. In Network and Distributed System Security (NDSS) Symposium","author":"Dio Andrea Di","year":"2023","unstructured":"Andrea Di Dio , Koen Koning , Herbert Bos , and Cristiano Giuffrida. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. In Network and Distributed System Security (NDSS) Symposium , 2023 . Andrea Di Dio, Koen Koning, Herbert Bos, and Cristiano Giuffrida. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. In Network and Distributed System Security (NDSS) Symposium, 2023."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.01.020"},{"key":"e_1_3_2_1_33_1","volume-title":"USENIX Large Installation System Administration Conference","author":"Down Chris","year":"2021","unstructured":"Chris Down . 5 Years of Cgroup v2: The Future of Linux Resource Control . USENIX Large Installation System Administration Conference , 2021 . Chris Down. 5 Years of Cgroup v2: The Future of Linux Resource Control. USENIX Large Installation System Administration Conference, 2021."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560673"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00035"},{"key":"e_1_3_2_1_36_1","volume-title":"SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface. arXiv preprint arXiv:2209.00685","author":"Fakhrzadehgan Ali","year":"2022","unstructured":"Ali Fakhrzadehgan , Prakash Ramrakhyani , Moinuddin K Qureshi , and Mattan Erez . SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface. arXiv preprint arXiv:2209.00685 , 2022 . Ali Fakhrzadehgan, Prakash Ramrakhyani, Moinuddin K Qureshi, and Mattan Erez. SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface. arXiv preprint arXiv:2209.00685, 2022."},{"key":"e_1_3_2_1_37_1","volume-title":"TRRespass: Exploiting the Many Sides of Target Row Refresh. In IEEE Symposium on Security and Privacy (S&P)","author":"Frigo Pietro","year":"2020","unstructured":"Pietro Frigo , Emanuele Vannacci , Hasan Hassan , Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi . TRRespass: Exploiting the Many Sides of Target Row Refresh. In IEEE Symposium on Security and Privacy (S&P) , 2020 . Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. TRRespass: Exploiting the Many Sides of Target Row Refresh. In IEEE Symposium on Security and Privacy (S&P), 2020."},{"key":"e_1_3_2_1_38_1","volume-title":"Gandhi and James Mickens. Rethinking Isolation Mechanisms for Datacenter Multitenancy. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 20)","author":"Varun","year":"2020","unstructured":"Varun Gandhi and James Mickens. Rethinking Isolation Mechanisms for Datacenter Multitenancy. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 20) , 2020 . Varun Gandhi and James Mickens. Rethinking Isolation Mechanisms for Datacenter Multitenancy. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 20), 2020."},{"key":"e_1_3_2_1_39_1","volume-title":"Armor: A RunTime Memory Hot-Row Detector","author":"Ghasempour Mohsen","year":"2015","unstructured":"Mohsen Ghasempour , Mikel Lujan , and Jim Garside . Armor: A RunTime Memory Hot-Row Detector , 2015 . Mohsen Ghasempour, Mikel Lujan, and Jim Garside. Armor: A RunTime Memory Hot-Row Detector, 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3309697.3331482"},{"key":"e_1_3_2_1_41_1","volume-title":"Elkim Roa. DRAM Row-Hammer Attack Reduction Using Dummy Cells. In IEEE Nordic Circuits and Systems Conference (NORCAS)","author":"Gomez Hector","year":"2016","unstructured":"Hector Gomez , Andres Amaya , and Elkim Roa. DRAM Row-Hammer Attack Reduction Using Dummy Cells. In IEEE Nordic Circuits and Systems Conference (NORCAS) , 2016 . Hector Gomez, Andres Amaya, and Elkim Roa. DRAM Row-Hammer Attack Reduction Using Dummy Cells. In IEEE Nordic Circuits and Systems Conference (NORCAS), 2016."},{"key":"e_1_3_2_1_42_1","volume-title":"Yuval Yarom. Another Flip in the Wall of Rowhammer Defenses. In IEEE Symposium on Security and Privacy (S&P)","author":"Gruss Daniel","year":"2018","unstructured":"Daniel Gruss , Moritz Lipp , Michael Schwarz , Daniel Genkin , Jonas Juffinger , Sioli O'Connell , Wolfgang Schoechl , and Yuval Yarom. Another Flip in the Wall of Rowhammer Defenses. In IEEE Symposium on Security and Privacy (S&P) , 2018 . Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, and Yuval Yarom. Another Flip in the Wall of Rowhammer Defenses. In IEEE Symposium on Security and Privacy (S&P), 2018."},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)","author":"Gruss Daniel","year":"2016","unstructured":"Daniel Gruss , Cl\u00e9mentine Maurice , and Stefan Mangard . Rowhammer.js : A Remote Software-Induced Fault Attack in Javascript . In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) , 2016 . Daniel Gruss, Cl\u00e9mentine Maurice, and Stefan Mangard. Rowhammer.js: A Remote Software-Induced Fault Attack in Javascript. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2016."},{"key":"e_1_3_2_1_44_1","unstructured":"Hasan Hassan Ataberk Olgun Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 Haocong Luo and Onur Mutlu. A Case for Self-Managing DRAM Chips: Improving Performance Efficiency Reliability and Security via Autonomous in-DRAM Maintenance Operations. arXiv preprint arXiv:2207.13358 2022.  Hasan Hassan Ataberk Olgun Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 Haocong Luo and Onur Mutlu. A Case for Self-Managing DRAM Chips: Improving Performance Efficiency Reliability and Security via Autonomous in-DRAM Maintenance Operations. arXiv preprint arXiv:2207.13358 2022."},{"key":"e_1_3_2_1_45_1","volume-title":"ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Hassan Hasan","year":"2019","unstructured":"Hasan Hassan , Minesh Patel , Jeremie S Kim , Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 , Nandita Vijaykumar , Nika Mansouri Ghiasi , Saugata Ghose , and Onur Mutlu . Crow : A Low-Cost Substrate for Improving Dram Performance, Energy Efficiency, and Reliability . In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2019 . Hasan Hassan, Minesh Patel, Jeremie S Kim, Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131, Nandita Vijaykumar, Nika Mansouri Ghiasi, Saugata Ghose, and Onur Mutlu. Crow: A Low-Cost Substrate for Improving Dram Performance, Energy Efficiency, and Reliability. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2019."},{"key":"e_1_3_2_1_46_1","volume-title":"ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Hassan Hasan","year":"2021","unstructured":"Hasan Hassan , Yahya Can Tugrul , Jeremie S Kim , Victor Van der Veen , Kaveh Razavi , and Onur Mutlu . Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications . In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2021 . Hasan Hassan, Yahya Can Tugrul, Jeremie S Kim, Victor Van der Veen, Kaveh Razavi, and Onur Mutlu. Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2021."},{"key":"e_1_3_2_1_47_1","unstructured":"Red Hat. 2.14. Reduce CPU Performance Spikes. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux_for_real_time\/7\/html\/tuning_guide\/reduce_cpu_performance_spikes.  Red Hat. 2.14. Reduce CPU Performance Spikes. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux_for_real_time\/7\/html\/tuning_guide\/reduce_cpu_performance_spikes."},{"key":"e_1_3_2_1_49_1","volume-title":"Frank Bellosa. Multiple Physical Mappings: Dynamic DRAM Channel Sharing and Partitioning. In ACM Asia Pacific Workshop on Systems (APSys)","author":"Hillenbrand Marius","year":"2017","unstructured":"Marius Hillenbrand , Mathias Gottschlag , Jens Kehne , and Frank Bellosa. Multiple Physical Mappings: Dynamic DRAM Channel Sharing and Partitioning. In ACM Asia Pacific Workshop on Systems (APSys) , 2017 . Marius Hillenbrand, Mathias Gottschlag, Jens Kehne, and Frank Bellosa. Multiple Physical Mappings: Dynamic DRAM Channel Sharing and Partitioning. In ACM Asia Pacific Workshop on Systems (APSys), 2017."},{"key":"e_1_3_2_1_50_1","volume-title":"DSAC: Low-Cost Rowhammer Mitigation using In-Dram Stochastic and Approximate Counting Algorithm. arXiv preprint arXiv:2302.03591","author":"Hong Seungki","year":"2023","unstructured":"Seungki Hong , Dongha Kim , Jaehyung Lee , Reum Oh , Changsik Yoo , Sangjoon Hwang , and Jooyoung Lee . DSAC: Low-Cost Rowhammer Mitigation using In-Dram Stochastic and Approximate Counting Algorithm. arXiv preprint arXiv:2302.03591 , 2023 . Seungki Hong, Dongha Kim, Jaehyung Lee, Reum Oh, Changsik Yoo, Sangjoon Hwang, and Jooyoung Lee. DSAC: Low-Cost Rowhammer Mitigation using In-Dram Stochastic and Approximate Counting Algorithm. arXiv preprint arXiv:2302.03591, 2023."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1984841"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2016.7805832"},{"key":"e_1_3_2_1_53_1","volume-title":"Architecture Specification: Intel Trust Domain Extensions (Intel TDX) Module","year":"2020","unstructured":"Intel. Architecture Specification: Intel Trust Domain Extensions (Intel TDX) Module , 2020 . https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/intel-tdx-module-1eas.pdf. Intel. Architecture Specification: Intel Trust Domain Extensions (Intel TDX) Module, 2020. https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/intel-tdx-module-1eas.pdf."},{"key":"e_1_3_2_1_54_1","volume-title":"Intel Trust Domain Extensions (Intel TDX)","year":"2022","unstructured":"Intel. Intel Trust Domain Extensions (Intel TDX) , 2022 . https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-trust-domain-extensions.html. Intel. Intel Trust Domain Extensions (Intel TDX), 2022. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-trust-domain-extensions.html."},{"key":"e_1_3_2_1_55_1","volume-title":"Introduction to Memory Bandwidth Allocation. intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/introduction-to-memory-bandwidth-allocation.html","year":"2022","unstructured":"Intel. Introduction to Memory Bandwidth Allocation. intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/introduction-to-memory-bandwidth-allocation.html , 2022 . Intel. Introduction to Memory Bandwidth Allocation. intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/introduction-to-memory-bandwidth-allocation.html, 2022."},{"key":"e_1_3_2_1_56_1","volume-title":"SKX EDAC Linux Driver. github.com\/torvalds\/linux\/blob\/master\/drivers\/edac\/skx_base.c","year":"2022","unstructured":"Intel. SKX EDAC Linux Driver. github.com\/torvalds\/linux\/blob\/master\/drivers\/edac\/skx_base.c , 2022 . Intel. SKX EDAC Linux Driver. github.com\/torvalds\/linux\/blob\/master\/drivers\/edac\/skx_base.c, 2022."},{"key":"e_1_3_2_1_57_1","volume-title":"Berk Sunar. Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. In IEEE Euromicro Conference on Digital System Design","author":"Irazoqui Gorka","year":"2015","unstructured":"Gorka Irazoqui , Thomas Eisenbarth , and Berk Sunar. Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. In IEEE Euromicro Conference on Digital System Design , 2015 . Gorka Irazoqui, Thomas Eisenbarth, and Berk Sunar. Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. In IEEE Euromicro Conference on Digital System Design, 2015."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_1_59_1","volume-title":"Blacksmith: Scalable Rowhammering in the Frequency Domain. In IEEE Symposium on Security and Privacy (S&P)","author":"Jattke Patrick","year":"2022","unstructured":"Patrick Jattke , Victor van der Veen, Pietro Frigo, Stijn Gunter, and Kaveh Razavi . Blacksmith: Scalable Rowhammering in the Frequency Domain. In IEEE Symposium on Security and Privacy (S&P) , 2022 . Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, and Kaveh Razavi. Blacksmith: Scalable Rowhammering in the Frequency Domain. In IEEE Symposium on Security and Privacy (S&P), 2022."},{"key":"e_1_3_2_1_60_1","volume-title":"Double Data Rate 4 (DDR4) SDRAM Standard","author":"JEDEC.","year":"2014","unstructured":"JEDEC. Double Data Rate 4 (DDR4) SDRAM Standard , 2014 . JEDEC. Double Data Rate 4 (DDR4) SDRAM Standard, 2014."},{"key":"e_1_3_2_1_61_1","first-page":"D209","volume":"201","author":"Low Power Double Data JEDEC.","unstructured":"JEDEC. Low Power Double Data Rate 4 (LPDDR4) SDRAM Standard , 201 7. JES D209 - D204 B. JEDEC. Low Power Double Data Rate 4 (LPDDR4) SDRAM Standard, 2017. JESD209-4B.","journal-title":"SDRAM Standard"},{"key":"e_1_3_2_1_62_1","volume-title":"DDR4 Registering Clock Driver Definition (DDR4RCD02)","author":"JEDEC.","year":"2019","unstructured":"JEDEC. DDR4 Registering Clock Driver Definition (DDR4RCD02) , 2019 . JEDEC. DDR4 Registering Clock Driver Definition (DDR4RCD02), 2019."},{"key":"e_1_3_2_1_63_1","volume-title":"Double Data Rate 5 (DDR5) SDRAM Standard","author":"JEDEC.","year":"2020","unstructured":"JEDEC. Double Data Rate 5 (DDR5) SDRAM Standard , 2020 . JEDEC. Double Data Rate 5 (DDR5) SDRAM Standard, 2020."},{"key":"e_1_3_2_1_64_1","volume-title":"DDR5 Registering Clock Driver Definition (DDR5RCD02)","author":"JEDEC.","year":"2023","unstructured":"JEDEC. DDR5 Registering Clock Driver Definition (DDR5RCD02) , 2023 . JEDEC. DDR5 Registering Clock Driver Definition (DDR5RCD02), 2023."},{"key":"e_1_3_2_1_65_1","volume-title":"Jong Kim. Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. In ACM Asia Conference on Computer and Communications Security (Asia CCS)","author":"Ji Sangwoo","year":"2019","unstructured":"Sangwoo Ji , Youngjoo Ko , Saeyoung Oh , and Jong Kim. Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. In ACM Asia Conference on Computer and Communications Security (Asia CCS) , 2019 . Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, and Jong Kim. Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. In ACM Asia Conference on Computer and Communications Security (Asia CCS), 2019."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.7924\/r4hh6p604"},{"key":"e_1_3_2_1_67_1","volume-title":"Panda. Memcached Design on High Performance RDMA Capable Interconnects. In IEEE International Conference on Parallel Processing (ICPP)","author":"Jose Jithin","year":"2011","unstructured":"Jithin Jose , Hari Subramoni , Miao Luo , Minjia Zhang , Jian Huang , Md. Wasi-ur Rahman , Nusrat S. Islam , Xiangyong Ouyang , Hao Wang , Sayantan Sur , and Dhabaleswar K . Panda. Memcached Design on High Performance RDMA Capable Interconnects. In IEEE International Conference on Parallel Processing (ICPP) , 2011 . Jithin Jose, Hari Subramoni, Miao Luo, Minjia Zhang, Jian Huang, Md. Wasi-ur Rahman, Nusrat S. Islam, Xiangyong Ouyang, Hao Wang, Sayantan Sur, and Dhabaleswar K. Panda. Memcached Design on High Performance RDMA Capable Interconnects. In IEEE International Conference on Parallel Processing (ICPP), 2011."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179390"},{"key":"e_1_3_2_1_69_1","volume-title":"AMD Memory Encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . AMD Memory Encryption. White paper , 2016 . David Kaplan, Jeremy Powell, and Tom Woller. AMD Memory Encryption. White paper, 2016."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544426"},{"key":"e_1_3_2_1_71_1","volume-title":"NUMA Memory Policy. kernel.org\/doc\/html\/latest\/admin-guide\/mm\/numa_memory_policy.html","author":"The","year":"2022","unstructured":"The kernel development community. NUMA Memory Policy. kernel.org\/doc\/html\/latest\/admin-guide\/mm\/numa_memory_policy.html , 2022 . The kernel development community. NUMA Memory Policy. kernel.org\/doc\/html\/latest\/admin-guide\/mm\/numa_memory_policy.html, 2022."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00051"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00011"},{"key":"e_1_3_2_1_74_1","volume-title":"Onur Mutlu. Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques. In ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Kim Jeremie S","year":"2020","unstructured":"Jeremie S Kim , Minesh Patel , Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 , Hasan Hassan , Roknoddin Azizi , Lois Orosa , and Onur Mutlu. Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques. In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2020 . Jeremie S Kim, Minesh Patel, Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131, Hasan Hassan, Roknoddin Azizi, Lois Orosa, and Onur Mutlu. Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2020."},{"key":"e_1_3_2_1_75_1","volume-title":"Hardware-Efficient Built-In Redundancy Analysis for Memory with Various Spares","author":"Kim Jooyoung","year":"2016","unstructured":"Jooyoung Kim , Woosung Lee , Keewon Cho , and Sungho Kang . Hardware-Efficient Built-In Redundancy Analysis for Memory with Various Spares . IEEE Transactions on Very Large Scale Integration (VLSI) Systems , 2016 . Jooyoung Kim, Woosung Lee, Keewon Cho, and Sungho Kang. Hardware-Efficient Built-In Redundancy Analysis for Memory with Various Spares. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2016."},{"key":"e_1_3_2_1_76_1","volume-title":"Jae W Lee, and Jung Ho Ahn. Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh. arXiv preprint arXiv:2108.06703","author":"Kim Michael Jaemin","year":"2021","unstructured":"Michael Jaemin Kim , Jaehyun Park , Yeonhong Park , Wanju Doh , Namhoon Kim , Tae Jun Ham , Jae W Lee, and Jung Ho Ahn. Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh. arXiv preprint arXiv:2108.06703 , 2021 . Michael Jaemin Kim, Jaehyun Park, Yeonhong Park, Wanju Doh, Namhoon Kim, Tae Jun Ham, Jae W Lee, and Jung Ho Ahn. Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh. arXiv preprint arXiv:2108.06703, 2021."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2907248"},{"key":"e_1_3_2_1_78_1","volume-title":"Core-Bias Modulation for Security and Reliability Enhancement. In IEEE International Solid-State Circuits Conference (ISSCC). IEEE","author":"Kim Woongrae","year":"2023","unstructured":"Woongrae Kim , Chulmoon Jung , Seongnyuh Yoo , Duckhwa Hong , Jeongjin Hwang , Jungmin Yoon , Ohyong Jung , Joonwoo Choi , Sanga Hyun , Mankeun Kang , Sangho Lee , Dohong Kim , Sanghyun Ku , Donhyun Choi , Nogeun Joo , Sangwoo Yoon , Junseok Noh , Byeongyong Go , Cheolhoe Kim , Sunil Hwang , Mihyun Hwang , Seol-Min Yi , Hyungmin Kim , Sanghyuk Heo , Yeonsu Jang , Kyoungchul Jang , Shinho Chu , Yoonna Oh , Kwidong Kim , Junghyun Kim , Soohwan Kim , Jeongtae Hwang , Sangil Park , Junphyo Lee , Inchul Jeong , Joohwan Cho , and Jonghwan Kim . A 1.1 V 16Gb DDR5 DRAM with Probabilistic-Aggressor Tracking , Refresh-Management Functionality , Per-Row Hammer Tracking , a Multi-Step Precharge , and Core-Bias Modulation for Security and Reliability Enhancement. In IEEE International Solid-State Circuits Conference (ISSCC). IEEE , 2023 . Woongrae Kim, Chulmoon Jung, Seongnyuh Yoo, Duckhwa Hong, Jeongjin Hwang, Jungmin Yoon, Ohyong Jung, Joonwoo Choi, Sanga Hyun, Mankeun Kang, Sangho Lee, Dohong Kim, Sanghyun Ku, Donhyun Choi, Nogeun Joo, Sangwoo Yoon, Junseok Noh, Byeongyong Go, Cheolhoe Kim, Sunil Hwang, Mihyun Hwang, Seol-Min Yi, Hyungmin Kim, Sanghyuk Heo, Yeonsu Jang, Kyoungchul Jang, Shinho Chu, Yoonna Oh, Kwidong Kim, Junghyun Kim, Soohwan Kim, Jeongtae Hwang, Sangil Park, Junphyo Lee, Inchul Jeong, Joohwan Cho, and Jonghwan Kim. A 1.1 V 16Gb DDR5 DRAM with Probabilistic-Aggressor Tracking, Refresh-Management Functionality, Per-Row Hammer Tracking, a Multi-Step Precharge, and Core-Bias Modulation for Security and Reliability Enhancement. In IEEE International Solid-State Circuits Conference (ISSCC). IEEE, 2023."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_80_1","volume-title":"Onur Mutlu. A Case for Exploiting Subarray-Level Parallelism (SALP) in DRAM. In ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Kim Yoongu","year":"2012","unstructured":"Yoongu Kim , Vivek Seshadri , Donghyuk Lee , Jamie Liu , and Onur Mutlu. A Case for Exploiting Subarray-Level Parallelism (SALP) in DRAM. In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2012 . Yoongu Kim, Vivek Seshadri, Donghyuk Lee, Jamie Liu, and Onur Mutlu. A Case for Exploiting Subarray-Level Parallelism (SALP) in DRAM. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2012."},{"key":"e_1_3_2_1_81_1","volume-title":"Joel Emer. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Kiriansky Vladimir","year":"2018","unstructured":"Vladimir Kiriansky , Ilia Lebedev , Saman Amarasinghe , Srinivas Devadas , and Joel Emer. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2018 . Vladimir Kiriansky, Ilia Lebedev, Saman Amarasinghe, Srinivas Devadas, and Joel Emer. DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2018."},{"key":"e_1_3_2_1_82_1","volume-title":"Anthony Liguori. KVM: The Linux Virtual Machine Monitor. In Linux symposium","author":"Kivity Avi","year":"2007","unstructured":"Avi Kivity , Yaniv Kamay , Dor Laor , Uri Lublin , and Anthony Liguori. KVM: The Linux Virtual Machine Monitor. In Linux symposium , 2007 . Avi Kivity, Yaniv Kamay, Dor Laor, Uri Lublin, and Anthony Liguori. KVM: The Linux Virtual Machine Monitor. In Linux symposium, 2007."},{"key":"e_1_3_2_1_83_1","volume-title":"Daniel Gruss. Half-Double: Hammering From the Next Row Over. In USENIX Security Symposium (USENIX Security)","author":"Kogler Andreas","year":"2022","unstructured":"Andreas Kogler , Jonas Juffinger , Salman Qazi , Yoongu Kim , Moritz Lipp , Nicolas Boichat , Eric Shiu , Mattias Nissler , and Daniel Gruss. Half-Double: Hammering From the Next Row Over. In USENIX Security Symposium (USENIX Security) , 2022 . Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, and Daniel Gruss. Half-Double: Hammering From the Next Row Over. In USENIX Security Symposium (USENIX Security), 2022."},{"key":"e_1_3_2_1_84_1","volume-title":"Kaveh Razavi. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Konoth Radhesh Krishnan","year":"2018","unstructured":"Radhesh Krishnan Konoth , Marco Oliverio , Andrei Tatar , Dennis Andriesse , Herbert Bos , Cristiano Giuffrida , and Kaveh Razavi. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 2018 . Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, and Kaveh Razavi. ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2018."},{"key":"e_1_3_2_1_85_1","unstructured":"Alexey Kopytov. Sysbench Manual. MySQL AB 2012.  Alexey Kopytov. Sysbench Manual. MySQL AB 2012."},{"key":"e_1_3_2_1_86_1","volume-title":"Yuval Yarom. RAMBleed: Reading Bits in Memory Without Accessing Them. In IEEE Symposium on Security and Privacy (S&P)","author":"Kwong Andrew","year":"2020","unstructured":"Andrew Kwong , Daniel Genkin , Daniel Gruss , and Yuval Yarom. RAMBleed: Reading Bits in Memory Without Accessing Them. In IEEE Symposium on Security and Privacy (S&P) , 2020 . Andrew Kwong, Daniel Genkin, Daniel Gruss, and Yuval Yarom. RAMBleed: Reading Bits in Memory Without Accessing Them. In IEEE Symposium on Security and Privacy (S&P), 2020."},{"key":"e_1_3_2_1_87_1","volume-title":"Kaveh Razavi. BLASTER: Characterizing the Blast Radius of Rowhammer. In Workshop on DRAM Security (DRAMSec)","author":"Lang Zhenrong","year":"2023","unstructured":"Zhenrong Lang , Patrick Jattke , Michele Marazzi , and Kaveh Razavi. BLASTER: Characterizing the Blast Radius of Rowhammer. In Workshop on DRAM Security (DRAMSec) , 2023 . Zhenrong Lang, Patrick Jattke, Michele Marazzi, and Kaveh Razavi. BLASTER: Characterizing the Blast Radius of Rowhammer. In Workshop on DRAM Security (DRAMSec), 2023."},{"key":"e_1_3_2_1_88_1","volume-title":"Onur Mutlu. Tiered-Latency DRAM: A Low Latency and Low Cost DRAM Architecture. In IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Lee Donghyuk","year":"2013","unstructured":"Donghyuk Lee , Yoongu Kim , Vivek Seshadri , Jamie Liu , Lavanya Subramanian , and Onur Mutlu. Tiered-Latency DRAM: A Low Latency and Low Cost DRAM Architecture. In IEEE International Symposium on High Performance Computer Architecture (HPCA) , 2013 . Donghyuk Lee, Yoongu Kim, Vivek Seshadri, Jamie Liu, Lavanya Subramanian, and Onur Mutlu. Tiered-Latency DRAM: A Low Latency and Low Cost DRAM Architecture. In IEEE International Symposium on High Performance Computer Architecture (HPCA), 2013."},{"key":"e_1_3_2_1_89_1","volume-title":"ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Lee Eojin","year":"2019","unstructured":"Eojin Lee , Ingab Kang , Sukhan Lee , G Edward Suh , and Jung Ho Ahn . TWiCe : Preventing Row-Hammering by Exploiting Time Window Counters . In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2019 . Eojin Lee, Ingab Kang, Sukhan Lee, G Edward Suh, and Jung Ho Ahn. TWiCe: Preventing Row-Hammering by Exploiting Time Window Counters. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2019."},{"key":"e_1_3_2_1_90_1","volume-title":"Nam Sung Kim, and Daehoon Kim. Exploiting OS-Level Memory Offlining for DRAM Power Management","author":"Lee Seunghak","year":"2019","unstructured":"Seunghak Lee , Nam Sung Kim, and Daehoon Kim. Exploiting OS-Level Memory Offlining for DRAM Power Management . IEEE Computer Architecture Letters (CAL) , 2019 . Seunghak Lee, Nam Sung Kim, and Daehoon Kim. Exploiting OS-Level Memory Offlining for DRAM Power Management. IEEE Computer Architecture Letters (CAL), 2019."},{"key":"e_1_3_2_1_91_1","volume-title":"Li and Jean-Luc Gaudiot. Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters. In IEEE Computer Software and Applications Conference (COMPSAC)","author":"Congmiao","year":"2019","unstructured":"Congmiao Li and Jean-Luc Gaudiot. Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters. In IEEE Computer Software and Applications Conference (COMPSAC) , 2019 . Congmiao Li and Jean-Luc Gaudiot. Detecting Malicious Attacks Exploiting Hardware Vulnerabilities Using Performance Counters. In IEEE Computer Software and Applications Conference (COMPSAC), 2019."},{"key":"e_1_3_2_1_92_1","volume-title":"Ricardo Bianchini. Pond: CXL-Based Memory Pooling Systems for Cloud Platforms. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Li Huaicheng","year":"2023","unstructured":"Huaicheng Li , Daniel S. Berger , Lisa Hsu , Daniel Ernst , Pantea Zardoshti , Stanko Novakovic , Monish Shah , Samir Rajadnya , Scott Lee , Ishwar Agarwal , Mark D. Hill , Marcus Fontoura , and Ricardo Bianchini. Pond: CXL-Based Memory Pooling Systems for Cloud Platforms. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) , 2023 . Huaicheng Li, Daniel S. Berger, Lisa Hsu, Daniel Ernst, Pantea Zardoshti, Stanko Novakovic, Monish Shah, Samir Rajadnya, Scott Lee, Ishwar Agarwal, Mark D. Hill, Marcus Fontoura, and Ricardo Bianchini. Pond: CXL-Based Memory Pooling Systems for Cloud Platforms. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2023."},{"key":"e_1_3_2_1_93_1","volume-title":"Daniel Gruss. Nethammer: Inducing Rowhammer Faults Through Network Requests. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","author":"Lipp Moritz","year":"2020","unstructured":"Moritz Lipp , Michael Schwarz , Lukas Raab , Lukas Lamster , Misiker Tadesse Aga , Cl\u00e9mentine Maurice , and Daniel Gruss. Nethammer: Inducing Rowhammer Faults Through Network Requests. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) , 2020 . Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Cl\u00e9mentine Maurice, and Daniel Gruss. Nethammer: Inducing Rowhammer Faults Through Network Requests. In IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2020."},{"key":"e_1_3_2_1_94_1","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Liu Qi","year":"2023","unstructured":"Qi Liu , Jieming Yin , Wujie Wen , Chengmo Yang , and Shi Sha . NeuroPots : Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks . In USENIX Security Symposium (USENIX Security) , 2023 . Qi Liu, Jieming Yin, Wujie Wen, Chengmo Yang, and Shi Sha. NeuroPots: Realtime Proactive Defense against Bit-Flip Attacks in Neural Networks. In USENIX Security Symposium (USENIX Security), 2023."},{"key":"e_1_3_2_1_95_1","volume-title":"Siloz Source Code. github.com\/efeslab\/siloz","author":"Loughlin Kevin","year":"2023","unstructured":"Kevin Loughlin , Jonah Rosenblum , Stefan Saroiu , Alec Wolman , Dimitrios Skarlatos , and Baris Kasikci . Siloz Source Code. github.com\/efeslab\/siloz , 2023 . Kevin Loughlin, Jonah Rosenblum, Stefan Saroiu, Alec Wolman, Dimitrios Skarlatos, and Baris Kasikci. Siloz Source Code. github.com\/efeslab\/siloz, 2023."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465295"},{"key":"e_1_3_2_1_97_1","volume-title":"Wild and Crazy Ideas (WACI) Session at ASPLOS","author":"Loughlin Kevin","year":"2022","unstructured":"Kevin Loughlin , Stefan Saroiu , Alec Wolman , and Baris Kasikci . Software-Defined Memory Controllers: An Idea Whose Time Has Come . In Wild and Crazy Ideas (WACI) Session at ASPLOS , 2022 . Kevin Loughlin, Stefan Saroiu, Alec Wolman, and Baris Kasikci. Software-Defined Memory Controllers: An Idea Whose Time Has Come. In Wild and Crazy Ideas (WACI) Session at ASPLOS, 2022."},{"key":"e_1_3_2_1_98_1","volume-title":"Baris Kasikci. MOESI-prime: Preventing Coherence-Induced Hammering in Commodity Workloads. In ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Loughlin Kevin","year":"2022","unstructured":"Kevin Loughlin , Stefan Saroiu , Alec Wolman , Yatin A. Manerkar , and Baris Kasikci. MOESI-prime: Preventing Coherence-Induced Hammering in Commodity Workloads. In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2022 . Kevin Loughlin, Stefan Saroiu, Alec Wolman, Yatin A. Manerkar, and Baris Kasikci. MOESI-prime: Preventing Coherence-Induced Hammering in Commodity Workloads. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2022."},{"key":"e_1_3_2_1_99_1","volume":"200","author":"Love Robert","unstructured":"Robert Love . Kernel Korner : CPU Affinity. Linux Journal , 200 3. Robert Love. Kernel Korner: CPU Affinity. Linux Journal, 2003.","journal-title":"CPU Affinity. Linux Journal"},{"key":"e_1_3_2_1_100_1","volume-title":"Chia-Lin Yang. Improving DRAM Latency with Dynamic Asymmetric Subarray. In ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Lu Shih-Lien","year":"2015","unstructured":"Shih-Lien Lu , Ying-Chen Lin , and Chia-Lin Yang. Improving DRAM Latency with Dynamic Asymmetric Subarray. In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2015 . Shih-Lien Lu, Ying-Chen Lin, and Chia-Lin Yang. Improving DRAM Latency with Dynamic Asymmetric Subarray. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2015."},{"key":"e_1_3_2_1_101_1","volume-title":"Onur Mutlu. RowPress: Amplifying Read Disturbance in Modern DRAM Chips. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA)","author":"Luo Haocong","year":"2023","unstructured":"Haocong Luo , Ataberk Olgun , Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 , Yahya Can Tu\u011frul , Steve Rhyner , Meryem Banu Cavlak , Jo\u00ebl Lindegger , Mohammad Sadrosadati , and Onur Mutlu. RowPress: Amplifying Read Disturbance in Modern DRAM Chips. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA) , 2023 . Haocong Luo, Ataberk Olgun, Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131, Yahya Can Tu\u011frul, Steve Rhyner, Meryem Banu Cavlak, Jo\u00ebl Lindegger, Mohammad Sadrosadati, and Onur Mutlu. RowPress: Amplifying Read Disturbance in Modern DRAM Chips. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA), 2023."},{"key":"e_1_3_2_1_102_1","volume-title":"Matta Erez. ERUCA: Efficient DRAM Resource Utilization and Resource Conflict Avoidance for Memory System Parallelism. In IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Lym Sangkug","year":"2018","unstructured":"Sangkug Lym , Heonjae Ha , Yongkee Kwon , Chun-kai Chang, Jungrae Kim , and Matta Erez. ERUCA: Efficient DRAM Resource Utilization and Resource Conflict Avoidance for Memory System Parallelism. In IEEE International Symposium on High Performance Computer Architecture (HPCA) , 2018 . Sangkug Lym, Heonjae Ha, Yongkee Kwon, Chun-kai Chang, Jungrae Kim, and Matta Erez. ERUCA: Efficient DRAM Resource Utilization and Resource Conflict Avoidance for Memory System Parallelism. In IEEE International Symposium on High Performance Computer Architecture (HPCA), 2018."},{"key":"e_1_3_2_1_103_1","volume-title":"Berger. Hyrax: Fail-in-Place Server Operation in Cloud Platforms. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Lyu Jialun","year":"2023","unstructured":"Jialun Lyu , Marisa You , Celine Irvene , Mark Jung , Tyler Narmore , Jacob Shapiro , Luke Marshall , Savyasachi Samal , Ioannis Manousakis , Lisa Hsu , Preetha Subbarayalu , Ashish Raniwala , Brijesh Warrier , Ricardo Bianchini , Bianca Schroeder , and Daniel S . Berger. Hyrax: Fail-in-Place Server Operation in Cloud Platforms. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 2023 . Jialun Lyu, Marisa You, Celine Irvene, Mark Jung, Tyler Narmore, Jacob Shapiro, Luke Marshall, Savyasachi Samal, Ioannis Manousakis, Lisa Hsu, Preetha Subbarayalu, Ashish Raniwala, Brijesh Warrier, Ricardo Bianchini, Bianca Schroeder, and Daniel S. Berger. Hyrax: Fail-in-Place Server Operation in Cloud Platforms. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2023."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2019-0502"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833664"},{"key":"e_1_3_2_1_106_1","volume-title":"Kaveh Razavi. REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. In IEEE Symposium on Security and Privacy (S&P)","author":"Marazzi Michele","year":"2023","unstructured":"Michele Marazzi , Flavien Solt , Patrick Jattke , Kubo Takashi , and Kaveh Razavi. REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. In IEEE Symposium on Security and Privacy (S&P) , 2023 . To appear. Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, and Kaveh Razavi. REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. In IEEE Symposium on Security and Privacy (S&P), 2023. To appear."},{"key":"e_1_3_2_1_107_1","volume-title":"Address Hashing in Intel Processors","author":"McCalpin John","year":"2018","unstructured":"John McCalpin . Address Hashing in Intel Processors . UT Faculty\/Researcher Works , 2018 . John McCalpin. Address Hashing in Intel Processors. UT Faculty\/Researcher Works, 2018."},{"key":"e_1_3_2_1_108_1","volume-title":"Link: www.cs.virginia.edu\/stream\/ref.html#what","author":"McCalpin John D","year":"1995","unstructured":"John D McCalpin . STREAM Benchmark . Link: www.cs.virginia.edu\/stream\/ref.html#what , 1995 . John D McCalpin. STREAM Benchmark. Link: www.cs.virginia.edu\/stream\/ref.html#what, 1995."},{"key":"e_1_3_2_1_109_1","volume-title":"Microsoft Learn","year":"2016","unstructured":"Microsoft. Hyper-V Virtual NUMA Overview . Microsoft Learn , 2016 . Microsoft. Hyper-V Virtual NUMA Overview. Microsoft Learn, 2016."},{"key":"e_1_3_2_1_110_1","volume-title":"High Performance Computing VM Sizes","year":"2023","unstructured":"Microsoft. High Performance Computing VM Sizes , 2023 . Microsoft. High Performance Computing VM Sizes, 2023."},{"key":"e_1_3_2_1_111_1","volume-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)","author":"Mohapatra Srikanta Kumar","year":"2021","unstructured":"Srikanta Kumar Mohapatra , Sankararao Majji , Prathipati Ratna Kumar , Ravula Arun Kumar , and Santoshachandra Rao Karanam . Authentication of Sub-NUMA Clustering Effect on Intel Skylake for Memory Latency and Bandwidth . Turkish Journal of Computer and Mathematics Education (TURCOMAT) , 2021 . Srikanta Kumar Mohapatra, Sankararao Majji, Prathipati Ratna Kumar, Ravula Arun Kumar, and Santoshachandra Rao Karanam. Authentication of Sub-NUMA Clustering Effect on Intel Skylake for Memory Latency and Bandwidth. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021."},{"key":"e_1_3_2_1_112_1","volume-title":"Moscibroda and Onur Mutlu. Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems. In USENIX Security Symposium (USENIX Security)","author":"Thomas","year":"2007","unstructured":"Thomas Moscibroda and Onur Mutlu. Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems. In USENIX Security Symposium (USENIX Security) , 2007 . Thomas Moscibroda and Onur Mutlu. Memory Performance Attacks: Denial of Memory Service in Multi-Core Systems. In USENIX Security Symposium (USENIX Security), 2007."},{"key":"e_1_3_2_1_113_1","volume-title":"Jolt: Recovering TLS Signing Keys via Rowhammer Faults. Cryptology ePrint Archive","author":"Mus Koksal","year":"2022","unstructured":"Koksal Mus , Yark\u0131n Dor\u00f6z , M Caner Tol , Kristi Rahman , and Berk Sunar . Jolt: Recovering TLS Signing Keys via Rowhammer Faults. Cryptology ePrint Archive , 2022 . Koksal Mus, Yark\u0131n Dor\u00f6z, M Caner Tol, Kristi Rahman, and Berk Sunar. Jolt: Recovering TLS Signing Keys via Rowhammer Faults. Cryptology ePrint Archive, 2022."},{"key":"e_1_3_2_1_114_1","volume-title":"Mutlu. Memory Scaling: A Systems Architecture Perspective. In IEEE International Memory Workshop","author":"Onur","year":"2013","unstructured":"Onur Mutlu. Memory Scaling: A Systems Architecture Perspective. In IEEE International Memory Workshop , 2013 . Onur Mutlu. Memory Scaling: A Systems Architecture Perspective. In IEEE International Memory Workshop, 2013."},{"key":"e_1_3_2_1_115_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Mutlu Onur","year":"2017","unstructured":"Onur Mutlu . The RowHammer Problem and Other Issues We May Face as Memory Becomes Denser. In Design , Automation & Test in Europe Conference & Exhibition (DATE) , 2017 . Onur Mutlu. The RowHammer Problem and Other Issues We May Face as Memory Becomes Denser. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017."},{"key":"e_1_3_2_1_116_1","volume-title":"Fundamentally Understanding and Solving RowHammer. arXiv preprint arXiv:2211.07613","author":"Mutlu Onur","year":"2022","unstructured":"Onur Mutlu , Ataberk Olgun , and Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 . Fundamentally Understanding and Solving RowHammer. arXiv preprint arXiv:2211.07613 , 2022 . Onur Mutlu, Ataberk Olgun, and Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131. Fundamentally Understanding and Solving RowHammer. arXiv preprint arXiv:2211.07613, 2022."},{"key":"e_1_3_2_1_117_1","volume-title":"Jaehyun Park, Chihun Song, Nam Sung Kim, and Jung Ho Ahn. X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands","author":"Nam Hwayong","year":"2023","unstructured":"Hwayong Nam , Seungmin Baek , Minbok Wi , Michael Jaemin Kim , Jaehyun Park, Chihun Song, Nam Sung Kim, and Jung Ho Ahn. X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands . IEEE Computer Architecture Letters (CAL) , 2023 . Hwayong Nam, Seungmin Baek, Minbok Wi, Michael Jaemin Kim, Jaehyun Park, Chihun Song, Nam Sung Kim, and Jung Ho Ahn. X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands. IEEE Computer Architecture Letters (CAL), 2023."},{"key":"e_1_3_2_1_118_1","volume-title":"Package org.apache.hadoop.examples.terasort","author":"Norris Jack","year":"2013","unstructured":"Jack Norris . Package org.apache.hadoop.examples.terasort , 2013 . Jack Norris. Package org.apache.hadoop.examples.terasort, 2013."},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00042"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480069"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"e_1_3_2_1_122_1","volume-title":"Stefan Mangard. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security Symposium (USENIX Security)","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl , Daniel Gruss , Cl\u00e9mentine Maurice , Michael Schwarz , and Stefan Mangard. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security Symposium (USENIX Security) , 2016 . Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In USENIX Security Symposium (USENIX Security), 2016."},{"key":"e_1_3_2_1_123_1","volume-title":"Qiao and Mark Seaborn. A New Approach for Rowhammer Attacks. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","author":"Rui","year":"2016","unstructured":"Rui Qiao and Mark Seaborn. A New Approach for Rowhammer Attacks. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST) , 2016 . Rui Qiao and Mark Seaborn. A New Approach for Rowhammer Attacks. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2016."},{"key":"e_1_3_2_1_124_1","volume-title":"ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Qureshi Moinuddin","year":"2022","unstructured":"Moinuddin Qureshi , Aditya Rohan , Gururaj Saileshwar , and Prashant J Nair . Hydra : Enabling Low-Overhead Mitigation of Row-Hammer at Ultra-Low Thresholds via Hybrid Tracking . In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2022 . Moinuddin Qureshi, Aditya Rohan, Gururaj Saileshwar, and Prashant J Nair. Hydra: Enabling Low-Overhead Mitigation of Row-Hammer at Ultra-Low Thresholds via Hybrid Tracking. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2022."},{"key":"e_1_3_2_1_125_1","volume-title":"USENIX Security Symposium (USENIX Security)","author":"Razavi Kaveh","year":"2016","unstructured":"Kaveh Razavi , Ben Gras , Erik Bosman , Bart Preneel , Cristiano Giuffrida , and Herbert Bos . Flip Feng Shui: Hammering a Needle in the Software Stack . In USENIX Security Symposium (USENIX Security) , 2016 . Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. Flip Feng Shui: Hammering a Needle in the Software Stack. In USENIX Security Symposium (USENIX Security), 2016."},{"key":"e_1_3_2_1_126_1","volume-title":"Razavi and Animesh Trivedi. Stratus: Clouds with Microarchitectural Resource Management. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud)","author":"Kaveh","year":"2020","unstructured":"Kaveh Razavi and Animesh Trivedi. Stratus: Clouds with Microarchitectural Resource Management. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud) , 2020 . Kaveh Razavi and Animesh Trivedi. Stratus: Clouds with Microarchitectural Resource Management. In USENIX Workshop on Hot Topics in Cloud Computing (HotCloud), 2020."},{"issue":"5","key":"e_1_3_2_1_127_1","volume":"42","author":"Russell Rusty","unstructured":"Rusty Russell . Virtio: Towards a De-Facto Standard for Virtual I\/O Devices. ACM SIGOPS Operating Systems Review , 42 ( 5 ), 2008. Rusty Russell. Virtio: Towards a De-Facto Standard for Virtual I\/O Devices. ACM SIGOPS Operating Systems Review, 42(5), 2008.","journal-title":"Devices. ACM SIGOPS Operating Systems Review"},{"key":"e_1_3_2_1_128_1","volume-title":"International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Saileshwar Gururaj","year":"2022","unstructured":"Gururaj Saileshwar , Bolin Wang , Moinuddin Qureshi , and Prashant J Nair . Randomized Row-Swap : Mitigating Row Hammer by Breaking Spatial Correlation Between Aggressor and Victim Rows . In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) , 2022 . Gururaj Saileshwar, Bolin Wang, Moinuddin Qureshi, and Prashant J Nair. Randomized Row-Swap: Mitigating Row Hammer by Breaking Spatial Correlation Between Aggressor and Victim Rows. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2022."},{"key":"e_1_3_2_1_129_1","volume-title":"Lucian Cojocar. The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses. In International Reliability Physics Symposium (IRPS)","author":"Saroiu Stefan","year":"2022","unstructured":"Stefan Saroiu , Alec Wolman , and Lucian Cojocar. The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses. In International Reliability Physics Symposium (IRPS) , 2022 . Stefan Saroiu, Alec Wolman, and Lucian Cojocar. The Price of Secrecy: How Hiding Internal DRAM Topologies Hurts Rowhammer Defenses. In International Reliability Physics Symposium (IRPS), 2022."},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00022"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00022"},{"key":"e_1_3_2_1_132_1","volume-title":"Xiaoning Ding. Paratick: Reducing Timer Overhead in Virtual Machines. In International Conference on Parallel Processing","author":"Schildermans Stijn","year":"2021","unstructured":"Stijn Schildermans , Kris Aerts , Jianchen Shan , and Xiaoning Ding. Paratick: Reducing Timer Overhead in Virtual Machines. In International Conference on Parallel Processing , 2021 . Stijn Schildermans, Kris Aerts, Jianchen Shan, and Xiaoning Ding. Paratick: Reducing Timer Overhead in Virtual Machines. In International Conference on Parallel Processing, 2021."},{"key":"e_1_3_2_1_133_1","volume-title":"Black Hat, 2015","author":"Seaborn Mark","year":"2015","unstructured":"Mark Seaborn and Thomas Dullien . Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges . Black Hat, 2015 . See also http:\/\/googleprojectzero.blogspot.co\/ 2015 \/03\/exploiting-dram-rowhammer-bug-to-gain.html. Mark Seaborn and Thomas Dullien. Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges. Black Hat, 2015. See also http:\/\/googleprojectzero.blogspot.co\/2015\/03\/exploiting-dram-rowhammer-bug-to-gain.html."},{"key":"e_1_3_2_1_134_1","volume-title":"Rami Melhem. Mitigating Wordline Crosstalk Using Adaptive Trees of Counters. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA)","author":"Seyedzadeh Seyed Mohammad","year":"2018","unstructured":"Seyed Mohammad Seyedzadeh , Alex K Jones , and Rami Melhem. Mitigating Wordline Crosstalk Using Adaptive Trees of Counters. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA) , 2018 . Seyed Mohammad Seyedzadeh, Alex K Jones, and Rami Melhem. Mitigating Wordline Crosstalk Using Adaptive Trees of Counters. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA), 2018."},{"key":"e_1_3_2_1_135_1","volume-title":"Rami Melhem. Mitigating Bitline Crosstalk Noise in DRAM Memories. In International Symposium on Memory Systems","author":"Seyedzadeh Seyed Mohammad","year":"2017","unstructured":"Seyed Mohammad Seyedzadeh , Donald Kline Jr , Alex K Jones , and Rami Melhem. Mitigating Bitline Crosstalk Noise in DRAM Memories. In International Symposium on Memory Systems , 2017 . Seyed Mohammad Seyedzadeh, Donald Kline Jr, Alex K Jones, and Rami Melhem. Mitigating Bitline Crosstalk Noise in DRAM Memories. In International Symposium on Memory Systems, 2017."},{"key":"e_1_3_2_1_136_1","volume-title":"Mohit Tiwari. Avoiding Information Leakage in the Memory Controller with Fixed Service Policies. In ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Shafiee Ali","year":"2015","unstructured":"Ali Shafiee , Akhila Gundu , Manjunath Shevgoor , Rajeev Balasubramonian , and Mohit Tiwari. Avoiding Information Leakage in the Memory Controller with Fixed Service Policies. In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2015 . Ali Shafiee, Akhila Gundu, Manjunath Shevgoor, Rajeev Balasubramonian, and Mohit Tiwari. Avoiding Information Leakage in the Memory Controller with Fixed Service Policies. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2015."},{"key":"e_1_3_2_1_137_1","volume-title":"LWN","author":"Sharma Vipin","year":"2022","unstructured":"Vipin Sharma . NUMA Aware Page Table's Page Allocation . LWN , 2022 . Vipin Sharma. NUMA Aware Page Table's Page Allocation. LWN, 2022."},{"key":"e_1_3_2_1_138_1","volume-title":"Linux Symposium. Citeseer","author":"Siddha Suresh","year":"2007","unstructured":"Suresh Siddha , Venkatesh Pallipadi , and AVD Ven . Getting Maximum Mileage out of Tickless . In Linux Symposium. Citeseer , 2007 . Suresh Siddha, Venkatesh Pallipadi, and AVD Ven. Getting Maximum Mileage out of Tickless. In Linux Symposium. Citeseer, 2007."},{"key":"e_1_3_2_1_139_1","volume-title":"Jung Ho Ahn. Reducing Memory Access Latency with Asymmetric DRAM Bank Organizations. In ACM\/IEEE International Symposium on Computer Architecture (ISCA)","author":"Son Young Hoon","year":"2013","unstructured":"Young Hoon Son , O Seongil , Yuhwan Ro , Jae W Lee , and Jung Ho Ahn. Reducing Memory Access Latency with Asymmetric DRAM Bank Organizations. In ACM\/IEEE International Symposium on Computer Architecture (ISCA) , 2013 . Young Hoon Son, O Seongil, Yuhwan Ro, Jae W Lee, and Jung Ho Ahn. Reducing Memory Access Latency with Asymmetric DRAM Bank Organizations. In ACM\/IEEE International Symposium on Computer Architecture (ISCA), 2013."},{"key":"e_1_3_2_1_140_1","volume-title":"Deep Dive on Amazon EC2","author":"Spicer Androski","year":"2017","unstructured":"Androski Spicer . Deep Dive on Amazon EC2 , 2017 . Androski Spicer. Deep Dive on Amazon EC2, 2017."},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507720"},{"key":"e_1_3_2_1_142_1","volume":"200","author":"Tanaka Brian K","unstructured":"Brian K Tanaka . Monitoring Virtual Memory with vmstat. Linux Journal , 200 5. Brian K Tanaka. Monitoring Virtual Memory with vmstat. Linux Journal, 2005.","journal-title":"Linux Journal"},{"key":"e_1_3_2_1_143_1","volume-title":"Jagadish Kotra. Improving Bank-Level Parallelism for Irregular Applications. In ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Tang Xulong","year":"2016","unstructured":"Xulong Tang , Mahmut Kandemir , Praveen Yedlapalli , and Jagadish Kotra. Improving Bank-Level Parallelism for Irregular Applications. In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2016 . Xulong Tang, Mahmut Kandemir, Praveen Yedlapalli, and Jagadish Kotra. Improving Bank-Level Parallelism for Irregular Applications. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2016."},{"key":"e_1_3_2_1_144_1","volume-title":"Kaveh Razavi. Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID)","author":"Tatar Andrei","year":"2018","unstructured":"Andrei Tatar , Cristiano Giuffrida , Herbert Bos , and Kaveh Razavi. Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID) , 2018 . Andrei Tatar, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2018."},{"key":"e_1_3_2_1_145_1","volume-title":"Kang G Shin. SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks. In IEEE Symposium on Security and Privacy (S&P)","author":"Tobah Youssef","year":"2022","unstructured":"Youssef Tobah , Andrew Kwong , Ingab Kang , Daniel Genkin , and Kang G Shin. SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks. In IEEE Symposium on Security and Privacy (S&P) , 2022 . Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, and Kang G Shin. SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks. In IEEE Symposium on Security and Privacy (S&P), 2022."},{"key":"e_1_3_2_1_146_1","volume-title":"Linux Source Code. https:\/\/github.com\/torvalds\/linux","author":"Linus Torvalds","year":"2023","unstructured":"Linus Torvalds et al. Linux Source Code. https:\/\/github.com\/torvalds\/linux , 2023 . Linus Torvalds et al. Linux Source Code. https:\/\/github.com\/torvalds\/linux, 2023."},{"key":"e_1_3_2_1_147_1","volume-title":"ACPI. INFO","author":"Firmware Unified Extensible","year":"2013","unstructured":"Unified Extensible Firmware Interface UEFI. Advanced Configuration and Power Interface Specification . ACPI. INFO , Roseville , 2013 . Unified Extensible Firmware Interface UEFI. Advanced Configuration and Power Interface Specification. ACPI. INFO, Roseville, 2013."},{"key":"e_1_3_2_1_148_1","volume-title":"Computer","author":"Uhlig Rich","year":"2005","unstructured":"Rich Uhlig , Gil Neiger , Dion Rodgers , Amy L Santoni , Fernando CM Martins , Andrew V Anderson , Steven M Bennett , Alain Kagi , Felix H Leung , and Larry Smith . Intel Virtualization Technology . Computer , 2005 . Rich Uhlig, Gil Neiger, Dion Rodgers, Amy L Santoni, Fernando CM Martins, Andrew V Anderson, Steven M Bennett, Alain Kagi, Felix H Leung, and Larry Smith. Intel Virtualization Technology. Computer, 2005."},{"key":"e_1_3_2_1_149_1","volume-title":"Cristiano Giuffrida. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. In ACM SIGSAC conference on computer and communications security (CCS)","author":"Der Veen Victor Van","year":"2016","unstructured":"Victor Van Der Veen , Yanick Fratantonio , Martina Lindorfer , Daniel Gruss , Cl\u00e9mentine Maurice , Giovanni Vigna , Herbert Bos , Kaveh Razavi , and Cristiano Giuffrida. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. In ACM SIGSAC conference on computer and communications security (CCS) , 2016 . Victor Van Der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Cl\u00e9mentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, and Cristiano Giuffrida. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. In ACM SIGSAC conference on computer and communications security (CCS), 2016."},{"key":"e_1_3_2_1_150_1","volume-title":"Kaveh Razavi. GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)","author":"van der Veen Victor","year":"2018","unstructured":"Victor van der Veen , Martina Lindorfer , Yanick Fratantonio , Harikrishnan Padmanabha Pillai , Giovanni Vigna , Christopher Kruegel , Herbert Bos , and Kaveh Razavi. GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) , 2018 . Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, and Kaveh Razavi. GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2018."},{"key":"e_1_3_2_1_151_1","volume-title":"Microsoft Azure","author":"Venkatraman Kirtana","year":"2019","unstructured":"Kirtana Venkatraman . Virtual Machine Memory Allocation and Placement on Azure Stack . Microsoft Azure , 2019 . Kirtana Venkatraman. Virtual Machine Memory Allocation and Placement on Azure Stack. Microsoft Azure, 2019."},{"key":"e_1_3_2_1_152_1","volume-title":"Intel","author":"Viswanathan Vish","year":"2021","unstructured":"Vish Viswanathan , Karthik Kumar , Thomas Willhalm , Patrick Lu , Blazej Filipiak , and Sri Sakthivelu . Intel Memory Latency Checker v3.9a . Intel , 2021 . Vish Viswanathan, Karthik Kumar, Thomas Willhalm, Patrick Lu, Blazej Filipiak, and Sri Sakthivelu. Intel Memory Latency Checker v3.9a. Intel, 2021."},{"key":"e_1_3_2_1_153_1","volume-title":"VMware Docs","year":"2022","unstructured":"VMware. Using NUMA Systems with ESXi . VMware Docs , 2022 . VMware. Using NUMA Systems with ESXi. VMware Docs, 2022."},{"key":"e_1_3_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835934"},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00036"},{"key":"e_1_3_2_1_156_1","volume-title":"IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE)","author":"Wang Zicheng","year":"2021","unstructured":"Zicheng Wang . Can \"Micro VM\" Become the Next Generation Computing Platform? : Performance Comparison Between Light Weight Virtual Machine, Container, and Traditional Virtual Machine . In IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE) , 2021 . Zicheng Wang. Can \"Micro VM\" Become the Next Generation Computing Platform?: Performance Comparison Between Light Weight Virtual Machine, Container, and Traditional Virtual Machine. In IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE), 2021."},{"key":"e_1_3_2_1_157_1","volume-title":"Dimitrios Skarlatos. TMO: Transparent Memory Offloading in Datacenters. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Weiner Johannes","year":"2022","unstructured":"Johannes Weiner , Niket Agarwal , Dan Schatzberg , Leon Yang , Hao Wang , Blaise Sanouillet , Bikash Sharma , Tejun Heo , Mayank Jain , Chunqiang Tang , and Dimitrios Skarlatos. TMO: Transparent Memory Offloading in Datacenters. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) , 2022 . Johannes Weiner, Niket Agarwal, Dan Schatzberg, Leon Yang, Hao Wang, Blaise Sanouillet, Bikash Sharma, Tejun Heo, Mayank Jain, Chunqiang Tang, and Dimitrios Skarlatos. TMO: Transparent Memory Offloading in Datacenters. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2022."},{"key":"e_1_3_2_1_158_1","volume-title":"Weisbecker. Status of Linux Dynticks. In Workshop on Operating Systems Platforms for Embedded Real-Time applications-OSPERT13","author":"Frederic","year":"2013","unstructured":"Frederic Weisbecker. Status of Linux Dynticks. In Workshop on Operating Systems Platforms for Embedded Real-Time applications-OSPERT13 . Citeseer , 2013 . Frederic Weisbecker. Status of Linux Dynticks. In Workshop on Operating Systems Platforms for Embedded Real-Time applications-OSPERT13. Citeseer, 2013."},{"key":"e_1_3_2_1_159_1","volume-title":"Jung Ho Ahn. SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling. In IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Wi Minbok","year":"2023","unstructured":"Minbok Wi , Jaehyun Park , Seoyoung Ko , Michael Jaemin Kim , Nam Sung Kim , Eojin Lee , and Jung Ho Ahn. SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling. In IEEE International Symposium on High Performance Computer Architecture (HPCA) , 2023 . Minbok Wi, Jaehyun Park, Seoyoung Ko, Michael Jaemin Kim, Nam Sung Kim, Eojin Lee, and Jung Ho Ahn. SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling. In IEEE International Symposium on High Performance Computer Architecture (HPCA), 2023."},{"key":"e_1_3_2_1_160_1","volume-title":"Prashant J Nair. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. In IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Woo Jeonghyun","year":"2023","unstructured":"Jeonghyun Woo , Gururaj Saileshwar , and Prashant J Nair. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. In IEEE International Symposium on High Performance Computer Architecture (HPCA) , 2023 . Jeonghyun Woo, Gururaj Saileshwar, and Prashant J Nair. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. In IEEE International Symposium on High Performance Computer Architecture (HPCA), 2023."},{"key":"e_1_3_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304039"},{"key":"e_1_3_2_1_162_1","volume-title":"Xen Project Wiki","year":"2015","unstructured":"Xen. Xen on NUMA Machines . Xen Project Wiki , 2015 . Xen. Xen on NUMA Machines. Xen Project Wiki, 2015."},{"key":"e_1_3_2_1_163_1","volume-title":"One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium (USENIX Security)","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao , Xiaokuan Zhang , Yinqian Zhang , and Radu Teodorescu . One Bit Flips , One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium (USENIX Security) , 2016 . Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In USENIX Security Symposium (USENIX Security), 2016."},{"key":"e_1_3_2_1_164_1","volume-title":"Security Analysis of the Silver Bullet Technique for RowHammer Prevention. arXiv preprint arXiv:2106.07084","author":"Ya\u011fl\u0131k\u00e7\u0131 Abdullah Giray","year":"2021","unstructured":"Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 , Jeremie S Kim , Fabrice Devaux , and Onur Mutlu . Security Analysis of the Silver Bullet Technique for RowHammer Prevention. arXiv preprint arXiv:2106.07084 , 2021 . Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131, Jeremie S Kim, Fabrice Devaux, and Onur Mutlu. Security Analysis of the Silver Bullet Technique for RowHammer Prevention. arXiv preprint arXiv:2106.07084, 2021."},{"key":"e_1_3_2_1_165_1","volume-title":"Onur Mutlu. Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Ya\u011fl\u0131k\u00e7\u0131 Abdullah Giray","year":"2022","unstructured":"Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 , Haocong Luo , Geraldo F De Oliviera , Ataberk Olgun , Minesh Patel , Jisung Park , Hasan Hassan , Jeremie S Kim , Lois Orosa , and Onur Mutlu. Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) , 2022 . Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131, Haocong Luo, Geraldo F De Oliviera, Ataberk Olgun, Minesh Patel, Jisung Park, Hasan Hassan, Jeremie S Kim, Lois Orosa, and Onur Mutlu. Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), 2022."},{"key":"e_1_3_2_1_166_1","volume-title":"Onur Mutlu. HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips. In ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Ya\u011fl\u0131k\u00e7\u0131 Abdullah Giray","year":"2022","unstructured":"Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131 , Ataberk Olgun , Minesh Patel , Haocong Luo , Hasan Hassan , Lois Orosa , O\u011fuz Ergin , and Onur Mutlu. HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips. In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2022 . Abdullah Giray Ya\u011fl\u0131k\u00e7\u0131, Ataberk Olgun, Minesh Patel, Haocong Luo, Hasan Hassan, Lois Orosa, O\u011fuz Ergin, and Onur Mutlu. HiRA: Hidden Row Activation for Reducing Refresh Latency of Off-the-Shelf DRAM Chips. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2022."},{"key":"e_1_3_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00037"},{"key":"e_1_3_2_1_168_1","volume-title":"Mapping the Intel Last-Level Cache. Cryptology ePrint Archive","author":"Yarom Yuval","year":"2015","unstructured":"Yuval Yarom , Qian Ge , Fangfei Liu , Ruby B Lee , and Gernot Heiser . Mapping the Intel Last-Level Cache. Cryptology ePrint Archive , 2015 . Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B Lee, and Gernot Heiser. Mapping the Intel Last-Level Cache. Cryptology ePrint Archive, 2015."},{"key":"e_1_3_2_1_169_1","volume-title":"Min You and Joon-Sung Yang. MRLoc: Mitigating Rowhammering Based on Memory Locality. In ACM\/IEEE Design Automation Conference (DAC)","author":"Jung","year":"2019","unstructured":"Jung Min You and Joon-Sung Yang. MRLoc: Mitigating Rowhammering Based on Memory Locality. In ACM\/IEEE Design Automation Conference (DAC) , 2019 . Jung Min You and Joon-Sung Yang. MRLoc: Mitigating Rowhammering Based on Memory Locality. In ACM\/IEEE Design Automation Conference (DAC), 2019."},{"key":"e_1_3_2_1_170_1","volume-title":"ACM SIGARCH Computer Architecture News (CAN)","author":"Zhan Xusheng","year":"2017","unstructured":"Xusheng Zhan , Yungang Bao , Christian Bienia , and Kai Li. PARSEC 3.0 : A Multicore Benchmark Suite with Network Stacks and SPLASH-2X . ACM SIGARCH Computer Architecture News (CAN) , 2017 . Xusheng Zhan, Yungang Bao, Christian Bienia, and Kai Li. PARSEC 3.0: A Multicore Benchmark Suite with Network Stacks and SPLASH-2X. ACM SIGARCH Computer Architecture News (CAN), 2017."},{"key":"e_1_3_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/360128.360134"},{"key":"e_1_3_2_1_172_1","volume-title":"Yuval Yarom. PThammer: Cross-User-Kernel-Boundary Rowhammer Through Implicit Accesses. In ACM\/IEEE International Symposium on Microarchitecture (MICRO)","author":"Zhang Zhi","year":"2020","unstructured":"Zhi Zhang , Yueqiang Cheng , Dongxi Liu , Surya Nepal , Zhi Wang , and Yuval Yarom. PThammer: Cross-User-Kernel-Boundary Rowhammer Through Implicit Accesses. In ACM\/IEEE International Symposium on Microarchitecture (MICRO) , 2020 . Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, and Yuval Yarom. PThammer: Cross-User-Kernel-Boundary Rowhammer Through Implicit Accesses. In ACM\/IEEE International Symposium on Microarchitecture (MICRO), 2020."},{"key":"e_1_3_2_1_173_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Zhang Zhi","year":"2022","unstructured":"Zhi Zhang , Yueqiang Cheng , Minghua Wang , Wei He , Wenhao Wang , Surya Nepal , Yansong Gao , Kang Li , Zhe Wang , and Chenggang Wu. SoftTRR : Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh . In USENIX Annual Technical Conference (ATC) , 2022 . Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, and Chenggang Wu. SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. In USENIX Annual Technical Conference (ATC), 2022."},{"key":"e_1_3_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10989-8_48"},{"key":"e_1_3_2_1_175_1","volume-title":"Dimitrios Skarlatos. Contiguitas: The Pursuit of Physical Memory Contiguity in Datacenters. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA)","author":"Zhao Kaiyang","year":"2023","unstructured":"Kaiyang Zhao , Kaiwen Xue , Ziqi Wang , Dan Schatzberg , Leon Yang , Antonis Manousis , Johannes Weiner , Rik Van Riel , Bikash Sharma , Chunqiang Tang , and Dimitrios Skarlatos. Contiguitas: The Pursuit of Physical Memory Contiguity in Datacenters. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA) , 2023 . Kaiyang Zhao, Kaiwen Xue, Ziqi Wang, Dan Schatzberg, Leon Yang, Antonis Manousis, Johannes Weiner, Rik Van Riel, Bikash Sharma, Chunqiang Tang, and Dimitrios Skarlatos. Contiguitas: The Pursuit of Physical Memory Contiguity in Datacenters. In ACM\/IEEE Annual International Symposium on Computer Architecture (ISCA), 2023."},{"key":"e_1_3_2_1_176_1","volume-title":"Adnan Siraj Rakin, and Shaahin Angizi. DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack. arXiv preprint arXiv:2305.08034","author":"Zhou Ranyang","year":"2023","unstructured":"Ranyang Zhou , Sabbir Ahmed , Adnan Siraj Rakin, and Shaahin Angizi. DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack. arXiv preprint arXiv:2305.08034 , 2023 . Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, and Shaahin Angizi. DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack. arXiv preprint arXiv:2305.08034, 2023."},{"key":"e_1_3_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.36"}],"event":{"name":"SOSP '23: 29th Symposium on Operating Systems Principles","location":"Koblenz Germany","acronym":"SOSP '23","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the 29th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613143","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3600006.3613143","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:49Z","timestamp":1750178209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613143"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":175,"alternative-id":["10.1145\/3600006.3613143","10.1145\/3600006"],"URL":"https:\/\/doi.org\/10.1145\/3600006.3613143","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]},"assertion":[{"value":"2023-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}