{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:43Z","timestamp":1773193603824,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["2333049"],"award-info":[{"award-number":["2333049"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3669940.3707278","type":"proceedings-article","created":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T12:28:01Z","timestamp":1738844881000},"page":"698-714","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["MOAT: Securely Mitigating Rowhammer with Per-Row Activation Counters"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1314-9096","authenticated-orcid":false,"given":"Moinuddin","family":"Qureshi","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4311-4394","authenticated-orcid":false,"given":"Salman","family":"Qazi","sequence":"additional","affiliation":[{"name":"Google, Mountain View, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"JEDEC Updates JESD79-5C DDR5 SDRAM Standard: Elevating Performance and Security for Next-Gen Technologies. https:\/\/www.jedec.org\/news\/pressreleases\/jedec-updates-jesd79-5c-ddr5-sdram-standard-elevating-performance-and-security."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872390"},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on DRAM Security (DRAMSec)","author":"Bennett Tanj","year":"2021","unstructured":"Tanj Bennett, Stefan Saroiu, AlecWolman, and Lucian Cojocar. Panopticon: A complete in-dram rowhammer mitigation. In Workshop on DRAM Security (DRAMSec), 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"Worshop on DRAM Security (DRAMSec)","author":"de Oliveira Junior Geraldo Francisco","year":"2024","unstructured":"Geraldo Francisco de Oliveira Junior, Ataberk Olgun, Oguz Ergin, and Onur Mutlu. Understanding the security benefits and overheads of emerging industry solutions to dram read disturbance. In Worshop on DRAM Security (DRAMSec), 2024."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"e_1_3_2_1_8_1","volume-title":"Method, apparatus and system for determining a count of accesses to a row of memory","author":"Greenfield Zvika","year":"2014","unstructured":"Zvika Greenfield, John B Halbert, and Kuljit S Bains. Method, apparatus and system for determining a count of accesses to a row of memory, 2014. US Patent App. 13\/626,479."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_15"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480110"},{"key":"e_1_3_2_1_12_1","volume-title":"Dsac: Low-cost rowhammer mitigation using in-dram stochastic and approximate counting algorithm. arXiv preprint arXiv:2302.03591","author":"Hong Seungki","year":"2023","unstructured":"Seungki Hong, Dongha Kim, Jaehyung Lee, Reum Oh, Changsik Yoo, Sangjoon Hwang, and Jooyoung Lee. Dsac: Low-cost rowhammer mitigation using in-dram stochastic and approximate counting algorithm. arXiv preprint arXiv:2302.03591, 2023."},{"key":"e_1_3_2_1_13_1","volume-title":"Moinuddin Qureshi. PrIDE: Achieving Secure Rowhammer Mitigation with Low- Cost In-DRAM Trackers. In Annual International Symposium on Computer Architecture","author":"Jaleel Aamer","year":"2024","unstructured":"Aamer Jaleel, Gururaj Saileshwar, Stephen Keckler, and Moinuddin Qureshi. PrIDE: Achieving Secure Rowhammer Mitigation with Low- Cost In-DRAM Trackers. In Annual International Symposium on Computer Architecture, 2024."},{"key":"e_1_3_2_1_14_1","volume-title":"BLACKSMITH: Rowhammering in the Frequency Domain. In 43rd IEEE Symposium on Security and Privacy'22 (Oakland)","author":"Jattke Patrick","year":"2022","unstructured":"Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, and Kaveh Razavi. BLACKSMITH: Rowhammering in the Frequency Domain. In 43rd IEEE Symposium on Security and Privacy'22 (Oakland), 2022. https:\/\/comsec.ethz.ch\/wp-content\/files\/blacksmith_sp22.pdf."},{"key":"e_1_3_2_1_15_1","volume-title":"33rd USENIX Security Symposium","author":"Jattke Patrick","year":"2024","unstructured":"Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej B\u00f6lcskei, and Kaveh Razavi. ZenHammer: Rowhammer attacks on AMD zen-based platforms. In 33rd USENIX Security Symposium, 2024."},{"key":"e_1_3_2_1_16_1","volume-title":"Near-term dram level rowhammer mitigation (jep300-1)","author":"JEDEC.","year":"2021","unstructured":"JEDEC. Near-term dram level rowhammer mitigation (jep300-1). 2021."},{"key":"e_1_3_2_1_17_1","volume-title":"System level rowhammer mitigation (jep301-1)","author":"JEDEC.","year":"2021","unstructured":"JEDEC. System level rowhammer mitigation (jep301-1). 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"JESD79-5C: DDR5 SDRAM Specifications","author":"JEDEC.","year":"2024","unstructured":"JEDEC. JESD79-5C: DDR5 SDRAM Specifications. 2024."},{"key":"e_1_3_2_1_19_1","first-page":"236","volume-title":"2023 IEEE Symposium on Security and Privacy (SP)","author":"Juffinger Jonas","year":"2022","unstructured":"Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, and Daniel Gruss. Csi: Rowhammer-cryptographic security and integrity against rowhammer. In 2023 IEEE Symposium on Security and Privacy (SP), pages 236--252. IEEE Computer Society, 2022."},{"issue":"1","key":"e_1_3_2_1_20_1","first-page":"9","article-title":"Architectural support for mitigating row hammering in dram memories","volume":"14","author":"Kim Dae-Hyun","year":"2014","unstructured":"Dae-Hyun Kim, Prashant J Nair, and Moinuddin K Qureshi. Architectural support for mitigating row hammering in dram memories. IEEE CAL, 14(1):9--12, 2014.","journal-title":"IEEE CAL"},{"key":"e_1_3_2_1_21_1","first-page":"638","volume-title":"ISCA","author":"Kim Jeremie S","year":"2020","unstructured":"Jeremie S Kim, Minesh Patel, Hasan Hassan, Roknoddin Azizi, Lois Orosa, and Onur Mutlu. Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques. In ISCA, pages 638--651. IEEE, 2020."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00088"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC42615.2023.10067805"},{"key":"e_1_3_2_1_24_1","volume-title":"ISCA","author":"Kim Yoongu","year":"2014","unstructured":"Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. Flipping bits in memory without accessing them: An experimental study of dram disturbance errors. ISCA, 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589063"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833664"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00071"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527421"},{"key":"e_1_3_2_1_31_1","volume-title":"The gap benchmark suite. In arXiv preprint arXiv:1508.03619","author":"Beamer K. Asanovic S.","year":"2015","unstructured":"K. Asanovic S. Beamer and D. Patterson. The gap benchmark suite. In arXiv preprint arXiv:1508.03619, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507716"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640404"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00049"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00073"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00022"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00022"},{"key":"e_1_3_2_1_38_1","first-page":"71","article-title":"Exploiting the DRAM rowhammer bug to gain kernel privileges","volume":"15","author":"Seaborn Mark","year":"2015","unstructured":"Mark Seaborn and Thomas Dullien. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat, 15:71, 2015.","journal-title":"Black Hat"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070999"},{"key":"e_1_3_2_1_41_1","first-page":"345","volume-title":"2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA)","author":"Blockhammer","year":"2021","unstructured":"Blockhammer: Preventing rowhammer at low cost by blacklisting rapidly-accessed dram rows. In 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA), pages 345--358. IEEE, 2021."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00016"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3669940.3707278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T14:48:36Z","timestamp":1755787716000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3669940.3707278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":42,"alternative-id":["10.1145\/3669940.3707278","10.1145\/3669940"],"URL":"https:\/\/doi.org\/10.1145\/3669940.3707278","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}