{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:07Z","timestamp":1750309507743,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2228028"],"award-info":[{"award-number":["2228028"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3656222","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9932-1733","authenticated-orcid":false,"given":"Ranyang","family":"Zhou","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5684-2731","authenticated-orcid":false,"given":"Sabbir","family":"Ahmed","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton, NY, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6056-2625","authenticated-orcid":false,"given":"Adnan Siraj","family":"Rakin","sequence":"additional","affiliation":[{"name":"State University of New York at Binghamton, Binghamton, NY, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2289-6381","authenticated-orcid":false,"given":"Shaahin","family":"Angizi","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"volume-title":"NCSU EDA FreePDK45","key":"e_1_3_2_1_1_1","unstructured":"2011. NCSU EDA FreePDK45. http:\/\/www.eda.ncsu.edu\/wiki\/FreePDK45: Contents"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Nathan Binkert et al. 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39 (2011) 1--7.","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Zhezhi He et al. 2020. Defending and harnessing the bit-flip based adversarial weight attack. In CVPR. 14095--14103.","DOI":"10.1109\/CVPR42600.2020.01410"},{"volume-title":"USENIX Security Symposium. 497--514","author":"Sanghyun","key":"e_1_3_2_1_4_1","unstructured":"Sanghyun Hong et al. 2019. Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks.. In USENIX Security Symposium. 497--514."},{"key":"e_1_3_2_1_5_1","volume-title":"Blacksmith: Scalable rowhammering in the frequency domain","author":"Patrick Jattke","year":"2022","unstructured":"Patrick Jattke et al. 2022. Blacksmith: Scalable rowhammering in the frequency domain. In SP. IEEE, 716--734."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jeremie S Kim et al. 2020. Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques. In ISCA. IEEE 638--651.","DOI":"10.1109\/ISCA45697.2020.00059"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Eojin Lee et al. 2019. TWiCe: Preventing row-hammering by exploiting time window counters. In ISCA. 385--396.","DOI":"10.1145\/3307650.3322232"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Jingtao Li et al. 2020. Defending bit-flip attack through DNN weight reconstruction. In DAC. IEEE 1--6.","DOI":"10.1109\/DAC18072.2020.9218665"},{"key":"e_1_3_2_1_10_1","volume-title":"RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery. arXiv preprint arXiv:2101.08254","author":"Jingtao Li","year":"2021","unstructured":"Jingtao Li et al. 2021. RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery. arXiv preprint arXiv:2101.08254 (2021)."},{"key":"e_1_3_2_1_11_1","volume-title":"Graphene: Strong yet lightweight row hammer protection","author":"Yeonhong Park","year":"2020","unstructured":"Yeonhong Park et al. 2020. Graphene: Strong yet lightweight row hammer protection. In MICRO. IEEE, 1--13."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Moinuddin Qureshi et al. 2022. Hydra: enabling low-overhead mitigation of row-hammer at ultra-low thresholds via hybrid tracking. In ISCA.","DOI":"10.1145\/3470496.3527421"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Adnan Siraj Rakin et al. 2019. Bit-flip attack: Crushing neural network with progressive bit search. In ICCV. 1211--1220.","DOI":"10.1109\/ICCV.2019.00130"},{"key":"e_1_3_2_1_14_1","volume-title":"Ra-bnn: Constructing robust & accurate binary neural network to simultaneously defend adversarial bit-flip attack and improve accuracy. arXiv preprint arXiv:2103.13813","author":"Rakin Adnan Siraj","year":"2021","unstructured":"Adnan Siraj Rakin et al. 2021. Ra-bnn: Constructing robust & accurate binary neural network to simultaneously defend adversarial bit-flip attack and improve accuracy. arXiv preprint arXiv:2103.13813 (2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3112932"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Gururaj Saileshwar et al. 2022. Randomized row-swap: mitigating Row Hammer by breaking spatial correlation between aggressor and victim rows. In ASPLOS. 1056--1069.","DOI":"10.1145\/3503222.3507716"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124544"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Vivek Seshadri Yoongu Kim et al. 2013. RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization. In MICRO.","DOI":"10.1145\/2540708.2540725"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Seyed Mohammad Seyedzadeh et al. 2016. Counter-based tree structure for row hammering mitigation in DRAM. CAL 16 (2016).","DOI":"10.1109\/LCA.2016.2614497"},{"key":"e_1_3_2_1_20_1","volume-title":"SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling","author":"Minbok Wi","year":"2023","unstructured":"Minbok Wi et al. 2023. SHADOW: Preventing Row Hammer in DRAM with Intra-Subarray Row Shuffling. In HPCA. IEEE, 333--346."},{"key":"e_1_3_2_1_21_1","unstructured":"Jeonghyun Woo et al. 2022. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems. arXiv preprint arXiv:2212.12613 (2022)."},{"volume-title":"USENIX Security Symposium.","author":"Mengjia","key":"e_1_3_2_1_22_1","unstructured":"Mengjia Yan et al. 2020. Cache telepathy: Leveraging shared resource attacks to learn DNN architectures. In USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","volume-title":"Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips. In USENIX.","author":"Fan Yao","year":"2020","unstructured":"Fan Yao et al. 2020. Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips. In USENIX."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2022.3220084"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ranyang Zhou et al. 2023. P-PIM: A Parallel Processing-in-DRAM Framework Enabling Row Hammer Protection. In DATE. IEEE.","DOI":"10.23919\/DATE56975.2023.10137204"}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Francisco CA USA","acronym":"DAC '24"},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656222","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3656222","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3656222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3656222"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":25,"alternative-id":["10.1145\/3649329.3656222","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3656222","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}