{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:52:15Z","timestamp":1774965135007,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"IITP","award":["RS-2024-00456287"],"award-info":[{"award-number":["RS-2024-00456287"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707242","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"637-652","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Marionette: A RowHammer Attack via Row Coupling"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2401-0285","authenticated-orcid":false,"given":"Seungmin","family":"Baek","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4202-6201","authenticated-orcid":false,"given":"Minbok","family":"Wi","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8822-2876","authenticated-orcid":false,"given":"Seonyong","family":"Park","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2466-9273","authenticated-orcid":false,"given":"Hwayong","family":"Nam","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9987-9809","authenticated-orcid":false,"given":"Michael Jaemin","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0442-5634","authenticated-orcid":false,"given":"Nam Sung","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Illinois, Urbana-Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1733-1394","authenticated-orcid":false,"given":"Jung Ho","family":"Ahn","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ANSI\/ASHRAE. 2021. 2021 Equipment Thermal Guidelines for Data Processing Environments."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872390"},{"key":"e_1_3_2_1_3_1","volume-title":"Panopticon: A Complete In-DRAM Rowhammer Mitigation. In 1st Workshop on DRAM Security (DRAMSec) co-located with ISCA","author":"Bennett Tanj","year":"2021","unstructured":"Tanj Bennett, Stefan Saroiu, Alec Wolman, and Lucian Cojocar. 2021. Panopticon: A Complete In-DRAM Rowhammer Mitigation. In 1st Workshop on DRAM Security (DRAMSec) co-located with ISCA 2021."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329827"},{"key":"e_1_3_2_1_5_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2017. CAn't Touch This: Software-only Mitigation against Rowhammer Attacks Targeting Kernel Memory. In 26th USENIX Security Symposium (USENIX Security 17). https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/brasser"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00072"},{"key":"e_1_3_2_1_7_1","unstructured":"Lucian Cojocar Kevin Loughlin Stefan Saroiu Baris Kasikci and Alec Wolman. 2021. mFIT: A Bump-in-the-Wire Tool for Plug-and-Play Analysis of Rowhammer Susceptibility Factors. Technical Report--Microsoft Research (2021)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"e_1_3_2_1_9_1","volume-title":"Performance Counters on Linux. In Linux Plumbers Conference.","author":"de Melo A. C.","year":"2009","unstructured":"A. C. de Melo. 2009. Performance Counters on Linux. In Linux Plumbers Conference."},{"key":"e_1_3_2_1_10_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"de Ridder Finn","year":"2021","unstructured":"Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, and Kaveh Razavi. 2021. SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. In 30th USENIX Security Symposium (USENIX Security 21). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ridder"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Andrea Di Dio Koen Koning Herbert Bos and Cristiano Giuffrida. 2023. Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. In NDSS. https:\/\/doi.org\/10.14722\/ndss.2023.24337","DOI":"10.14722\/ndss.2023.24337"},{"key":"e_1_3_2_1_12_1","volume-title":"accessed","year":"2024","unstructured":"Efeslab. accessed in Sep 2024. Siloz - GitHub Repository. https:\/\/github.com\/efeslab\/siloz"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Fei Gao Georgios Tziantzioulis and David Wentzlaff. 2019. ComputeDRAM: In-Memory Compute Using Off-the-Shelf DRAMs. In MICRO. https:\/\/doi.org\/10.1145\/3352460.3358260","DOI":"10.1145\/3352460.3358260"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice and Stefan Mangard. 2016. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. In Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). https:\/\/doi.org\/10.1007\/978-3-319-40667-115","DOI":"10.1007\/978-3-319-40667-115"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480110"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2302.03591"},{"key":"e_1_3_2_1_19_1","unstructured":"Intel. 2022. SKX EDAC Linux Driver. https:\/\/github.com\/torvalds\/linux\/blob\/master\/drivers\/edac\/skx_base.c"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833772"},{"key":"e_1_3_2_1_22_1","volume-title":"ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms. In 33rd USENIX Security Symposium (USENIX Security","author":"Jattke Patrick","year":"2024","unstructured":"Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej B\u00f6lcskei, and Kaveh Razavi. 2024. ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms. In 33rd USENIX Security Symposium (USENIX Security 2024). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/jattke"},{"key":"e_1_3_2_1_23_1","unstructured":"JEDEC. 2015. Standard No. 21C. Annex L: Serial Presence Detect (SPD) for DDR4 SDRAM Modules."},{"key":"e_1_3_2_1_24_1","unstructured":"JEDEC. 2017a. DDR4 SDRAM Standard."},{"key":"e_1_3_2_1_25_1","unstructured":"JEDEC. 2017b. DDR5 SDRAM Standard."},{"key":"e_1_3_2_1_26_1","unstructured":"JEDEC. 2023. DDR4 Registering Clock Driver (DDR4RCD02)."},{"key":"e_1_3_2_1_27_1","volume-title":"33th USENIX Security Symposium (USENIX Security 24)","author":"Kang Ingab","year":"2024","unstructured":"Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, and Yuval Yarom. 2024. Sledge-Hammer: Amplifying Rowhammer via Bank-level Parallelism. In 33th USENIX Security Symposium (USENIX Security 24). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/kang"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Jeremie S Kim Minesh Patel A Giray Ya\u011fl\u0131k\u00e7\u0131 Hasan Hassan Roknoddin Azizi Lois Orosa and Onur Mutlu. 2020. Revisiting RowHammer: An Experimental Analysis of Modern DRAM Devices and Mitigation Techniques. In ISCA. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00059","DOI":"10.1109\/ISCA45697.2020.00059"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00088"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3623777"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"Woongrae Kim Chulmoon Jung Seongnyuh Yoo Duckhwa Hong Jeongjin Hwang Jungmin Yoon Ohyong Jung Joonwoo Choi Sanga Hyun Mankeun Kang Sangho Lee Dohong Kim Sanghyun Ku Donhyun Choi Nogeun Joo Sangwoo Yoon Junseok Noh Byeongyong Go Cheolhoe Kim Sunil Hwang Mihyun Hwang Seol-Min Yi Hyungmin Kim Sanghyuk Heo Yeonsu Jang Kyoungchul Jang Shinho Chu Yoonna Oh Kwidong Kim Junghyun Kim Soohwan Kim Jeongtae Hwang Sangil Park Junphyo Lee Inchul Jeong Joohwan Cho and Jonghwan Kim. 2023a. A 1.1V 16Gb DDR5 DRAM with Probabilistic-Aggressor Tracking Refresh-Management Functionality Per-Row Hammer Tracking a Multi-Step Precharge and Core-Bias Modulation for Security and Reliability Enhancement. In 2023 IEEE International Solid-State Circuits Conference (ISSCC). https:\/\/doi.org\/10.1109\/ISSCC42615.2023.10067805","DOI":"10.1109\/ISSCC42615.2023.10067805"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Yoongu Kim Vivek Seshadri Donghyuk Lee Jamie Liu and Onur Mutlu. 2012. A Case for Exploiting Subarray-Level Parallelism (SALP) in DRAM. In ISCA. https:\/\/doi.org\/10.1145\/2366231.2337202","DOI":"10.1145\/2366231.2337202"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_35_1","volume-title":"Half-Double: Hammering From the Next Row Over. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Kogler Andreas","year":"2022","unstructured":"Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, and Daniel Gruss. 2022. Half-Double: Hammering From the Next Row Over. In 31st USENIX Security Symposium (USENIX Security 22). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/kogler-half-double"},{"key":"e_1_3_2_1_36_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Konoth Radhesh Krishnan","year":"2018","unstructured":"Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, and Kaveh Razavi. 2018. ZebRAM: Comprehensive and Compatible Software Protection against Rowhammer Attacks. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). https:\/\/doi.org\/doi\/10.5555\/3291168.3291220"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Eojin Lee Ingab Kang Sukhan Lee G Edward Suh and Jung Ho Ahn. 2019. TWiCe: Preventing Row-hammering by Exploiting Time Window Counters. In ISCA. https:\/\/doi.org\/10.1145\/3307650.3322232","DOI":"10.1145\/3307650.3322232"},{"key":"e_1_3_2_1_39_1","unstructured":"LENOVO. 2015. Row Hammer Privilege Escalation Lenovo Security Advisory: LEN-2015-009. https:\/\/support.lenovo.com\/au\/en\/product_security\/row_ hammer"},{"key":"e_1_3_2_1_40_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18). https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613143"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/357Steve"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3929\/ethz-b-000678065"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2023.3296153"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA59077.2024.00083"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3282172"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2310.14665"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480069"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"e_1_3_2_1_50_1","volume-title":"DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Pessl Peter","year":"2016","unstructured":"Peter Pessl, Daniel Gruss, Cl\u00e9mentine Maurice, Michael Schwarz, and Stefan Mangard. 2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. In 25th USENIX Security Symposium (USENIX Security 16). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/pessl"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2407.09995"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527421"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833743"},{"key":"e_1_3_2_1_54_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Razavi Kaveh","year":"2016","unstructured":"Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. 2016. Flip Feng Shui: Hammering a Needle in the Software Stack. In 25th USENIX Security Symposium (USENIX Security 16). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/razavi"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507716"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640404"},{"key":"e_1_3_2_1_57_1","volume-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat","author":"Seaborn Mark","year":"2015","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat (2015). https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Seaborn-Exploiting-The-DRAM-Rowhammer-Bug-To-Gain-Kernel-Privileges.pdf"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540725"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620666.3651325"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833802"},{"key":"e_1_3_2_1_61_1","volume-title":"Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. In 33th USENIX Security Symposium (USENIX Security 24)","author":"Tobah Youssef","year":"2024","unstructured":"Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, and Kang G Shin. 2024. Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. In 33th USENIX Security Symposium (USENIX Security 24). https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/tobah"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_5"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218599"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070966"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070999"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","unstructured":"Xin-Chuan Wu Timothy Sherwood Frederic T Chong and Yanjing Li. 2019. Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells. In ASPLOS. https:\/\/doi.org\/10.1145\/3297858.3304039","DOI":"10.1145\/3297858.3304039"},{"key":"e_1_3_2_1_68_1","volume-title":"One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Xiao Yuan","year":"2016","unstructured":"Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. 2016. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In 25th USENIX Security Symposium (USENIX Security 16). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/xiao"},{"key":"e_1_3_2_1_69_1","unstructured":"AMD Xilinx. [n. d.]. Alveo U280 FPGA Board. https:\/\/www.xilinx.com\/products\/boards-and-kits\/alveo\/u280.html"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00048"},{"key":"e_1_3_2_1_71_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yao Fan","year":"2020","unstructured":"Fan Yao, Adnan Siraj Rakin, and Deliang Fan. 2020. DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. In 29th USENIX Security Symposium (USENIX Security 20). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/yao"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","unstructured":"A. Giray Ya\u011flik\u00e7i Minesh Patel Jeremie S. Kim Roknoddin Azizi Ataberk Olgun Lois Orosa Hasan Hassan Jisung Park Konstantinos Kanellopoulos Taha Shahroodi Saugata Ghose and Onur Mutlu. 2021. BlockHammer: Preventing RowHammer at Low Cost by Blacklisting Rapidly-Accessed DRAM Rows. In HPCA. https:\/\/doi.org\/10.1109\/HPCA51647.2021.00037","DOI":"10.1109\/HPCA51647.2021.00037"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","unstructured":"Zhi Zhang Yueqiang Cheng Dongxi Liu Surya Nepal Zhi Wang and Yuval Yarom. 2020. PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. In MICRO. https:\/\/doi.org\/10.1109\/MICRO50266.2020.00016","DOI":"10.1109\/MICRO50266.2020.00016"},{"key":"e_1_3_2_1_74_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Zhang Zhi","year":"2022","unstructured":"Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, and Chenggang Wu. 2022. SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). https:\/\/www.usenix.org\/conference\/atc22\/presentation\/zhang-zhi"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","unstructured":"Zhao Zhang Zhichun Zhu and Xiaodong Zhang. 2000. A Permutation-based Page Interleaving Scheme to Reduce Row-buffer Conflict and Exploit Data Locality. In MICRO. https:\/\/doi.org\/10.1109\/MICRO.2000.898056","DOI":"10.1109\/MICRO.2000.898056"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:50:23Z","timestamp":1755787823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":75,"alternative-id":["10.1145\/3669940.3707242","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707242","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}