{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:29Z","timestamp":1773193589201,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["233304"],"award-info":[{"award-number":["233304"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,21]]},"DOI":"10.1145\/3695053.3730997","type":"proceedings-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T16:43:11Z","timestamp":1750437791000},"page":"723-738","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["MoPAC: Efficiently Mitigating Rowhammer with Probabilistic Activation Counting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0236-701X","authenticated-orcid":false,"given":"Suhas","family":"Vittal","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4311-4394","authenticated-orcid":false,"given":"Salman","family":"Qazi","sequence":"additional","affiliation":[{"name":"Google, San Jose, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5811-6108","authenticated-orcid":false,"given":"Poulami","family":"Das","sequence":"additional","affiliation":[{"name":"University of Texas, Austin, Austin, Texas, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1314-9096","authenticated-orcid":false,"given":"Moinuddin","family":"Qureshi","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"e_1_3_3_5_9_4_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071066"},{"key":"e_1_3_3_5_9_4_3_2","volume-title":"Workshop on DRAM Security (DRAMSec)","author":"Bennett Tanj","year":"2021","unstructured":"Tanj Bennett, Stefan Saroiu, Alec Wolman, and Lucian Cojocar. 2021. Panopticon: A Complete In-DRAM Rowhammer Mitigation. In Workshop on DRAM Security (DRAMSec)."},{"key":"e_1_3_3_5_9_4_4_2","unstructured":"O\u011fuzhan Canpolat A\u00a0Giray Ya\u011fl\u0131k\u00e7\u0131 Ataberk Olgun \u0130smail\u00a0Emir Y\u00fcksel Yahya\u00a0Can Tu\u011frul Konstantinos Kanellopoulos O\u011fuz Ergin and Onur Mutlu. 2024. Leveraging Adversarial Detection to Enable Scalable and Low Overhead RowHammer Mitigations. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.13477 (2024)."},{"key":"e_1_3_3_5_9_4_5_2","doi-asserted-by":"crossref","unstructured":"O\u011fuzhan Canpolat A\u00a0Giray Ya\u011fl\u0131k\u00e7\u0131 Geraldo\u00a0F Oliveira Ataberk Olgun Nisa Bostanc\u0131 \u0130smail\u00a0Emir Y\u00fcksel Haocong Luo O\u011fuz Ergin and Onur Mutlu. 2025. Chronus: Understanding and Securing the Cutting-Edge Industry Solutions to DRAM Read Disturbance. HPCA (2025).","DOI":"10.1109\/HPCA61900.2025.00071"},{"key":"e_1_3_3_5_9_4_6_2","volume-title":"Worshop on DRAM Security (DRAMSec)","author":"Canpolat O\u011fuzhan","year":"2024","unstructured":"O\u011fuzhan Canpolat, Giray\u00a0A Yaglikci, Geraldo Francisco\u00a0de Oliveira\u00a0Junior, Ataberk Olgun, Oguz Ergin, and Onur Mutlu. 2024. Understanding the Security Benefits and Overheads of Emerging Industry Solutions to DRAM Read Disturbance. In Worshop on DRAM Security (DRAMSec)."},{"key":"e_1_3_3_5_9_4_7_2","volume-title":"USENIX Security 21","author":"Ridder Finn de","year":"2021","unstructured":"Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, and Kaveh Razavi. 2021. SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. In USENIX Security 21."},{"key":"e_1_3_3_5_9_4_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00035"},{"key":"e_1_3_3_5_9_4_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"e_1_3_3_5_9_4_10_2","unstructured":"Zvika Greenfield John\u00a0B Halbert and Kuljit\u00a0S Bains. 2014. Method apparatus and system for determining a count of accesses to a row of memory. US Patent App. 13\/626 479."},{"key":"e_1_3_3_5_9_4_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_3_5_9_4_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480110"},{"key":"e_1_3_3_5_9_4_13_2","volume-title":"ISCA","author":"Jaleel Aamer","year":"2024","unstructured":"Aamer Jaleel, Gururaj Saileshwar, Stephen\u00a0W Keckler, and Moinuddin Qureshi. 2024. PrIDE: Achieving Secure Rowhammer Mitigation with Low-Cost In-DRAM Trackers. In ISCA. IEEE."},{"key":"e_1_3_3_5_9_4_14_2","volume-title":"43rd IEEE Symposium on Security and Privacy\u201922 (Oakland)","author":"Jattke Patrick","year":"2022","unstructured":"Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, and Kaveh Razavi. 2022. BLACKSMITH: Rowhammering in the Frequency Domain. In 43rd IEEE Symposium on Security and Privacy\u201922 (Oakland). https:\/\/comsec.ethz.ch\/wp-content\/files\/blacksmith_sp22.pdf."},{"key":"e_1_3_3_5_9_4_15_2","unstructured":"JEDEC. 2024. JESD79-5C: DDR5 SDRAM Specifications. (2024)."},{"key":"e_1_3_3_5_9_4_16_2","first-page":"236","volume-title":"2023 IEEE Symposium on Security and Privacy (SP)","author":"Juffinger Jonas","year":"2022","unstructured":"Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, and Daniel Gruss. 2022. CSI: Rowhammer-Cryptographic Security and Integrity against Rowhammer. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 236\u2013252."},{"key":"e_1_3_3_5_9_4_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155624"},{"key":"e_1_3_3_5_9_4_18_2","doi-asserted-by":"crossref","unstructured":"Dae-Hyun Kim Prashant\u00a0J Nair and Moinuddin\u00a0K Qureshi. 2014. Architectural support for mitigating row hammering in DRAM memories. IEEE CAL 14 1 (2014) 9\u201312.","DOI":"10.1109\/LCA.2014.2332177"},{"key":"e_1_3_3_5_9_4_19_2","first-page":"638","volume-title":"ISCA","author":"Kim Jeremie\u00a0S","year":"2020","unstructured":"Jeremie\u00a0S Kim, Minesh Patel, A\u00a0Giray Ya\u011fl\u0131k\u00e7\u0131, Hasan Hassan, Roknoddin Azizi, Lois Orosa, and Onur Mutlu. 2020. Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques. In ISCA. IEEE, 638\u2013651."},{"key":"e_1_3_3_5_9_4_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00088"},{"key":"e_1_3_3_5_9_4_21_2","doi-asserted-by":"crossref","unstructured":"Yoongu Kim Ross Daly Jeremie Kim Chris Fallin Ji\u00a0Hye Lee Donghyuk Lee Chris Wilkerson Konrad Lai and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. ISCA (2014).","DOI":"10.1109\/ISCA.2014.6853210"},{"key":"e_1_3_3_5_9_4_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"e_1_3_3_5_9_4_23_2","doi-asserted-by":"crossref","unstructured":"Shang Li Zhiyuan Yang Dhiraj Reddy Ankur Srivastava and Bruce\u00a0L. Jacob. 2020. DRAMsim3: A Cycle-Accurate Thermal-Capable DRAM Simulator. IEEE Comput. Archit. Lett. 19 2 (2020) 110\u2013113.","DOI":"10.1109\/LCA.2020.2973991"},{"key":"e_1_3_3_5_9_4_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589063"},{"key":"e_1_3_3_5_9_4_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168855"},{"key":"e_1_3_3_5_9_4_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833664"},{"key":"e_1_3_3_5_9_4_27_2","volume-title":"4th Workshop on DRAM Security (DRAMSec) co-located with ISCA 2024","author":"Marazzi Michele","year":"2024","unstructured":"Michele Marazzi and Kaveh Razavi. 2024. RISC-H: Rowhammer Attacks on RISC-V. In 4th Workshop on DRAM Security (DRAMSec) co-located with ISCA 2024."},{"key":"e_1_3_3_5_9_4_28_2","unstructured":"John\u00a0D. McCalpin. 1995. Memory Bandwidth and Machine Balance in Current High Performance Computers. IEEE Computer Society Technical Committee on Computer Architecture (TCCA) Newsletter (1995)."},{"key":"e_1_3_3_5_9_4_29_2","series-title":"(SEC\u201907)","volume-title":"Proceedings of 16th USENIX Security Symposium","author":"Moscibroda Thomas","year":"2007","unstructured":"Thomas Moscibroda and Onur Mutlu. 2007. Memory performance attacks: denial of memory service in multi-core systems. In Proceedings of 16th USENIX Security Symposium(SEC\u201907)."},{"key":"e_1_3_3_5_9_4_30_2","doi-asserted-by":"crossref","unstructured":"Ataberk Olgun F.\u00a0Nisa Bostanci Ismail\u00a0Emir Yuksel Oguzhan Canpolat Haocong Luo Geraldo\u00a0F. Oliveira A.\u00a0Giray Yaglik\u00e7i Minesh Patel and Onur Mutlu. 2025. Variable Read Disturbance: An Experimental Analysis of Temporal Variation in DRAM Read Disturbance. HPCA (2025).","DOI":"10.1109\/HPCA61900.2025.00069"},{"key":"e_1_3_3_5_9_4_31_2","unstructured":"Peter Pessl Daniel Gruss Cl\u00e9mentine Maurice Michael Schwarz and Stefan Mangard. 2016. DRAMA: exploiting dram addressing for cross-cpu attacks(SEC\u201916)."},{"key":"e_1_3_3_5_9_4_32_2","unstructured":"Moinuddin Qureshi and Salman Qazi. 2024. MOAT: Securely Mitigating Rowhammer with Per-Row Activation Counters. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.09995 (2024)."},{"key":"e_1_3_3_5_9_4_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00071"},{"key":"e_1_3_3_5_9_4_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527421"},{"key":"e_1_3_3_5_9_4_35_2","unstructured":"Moinuddin Qureshi Anish Saxena and Aamer Jaleel. 2024. Impress: Securing dram against data-disturbance errors via implicit row-press mitigation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.16006 (2024)."},{"key":"e_1_3_3_5_9_4_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507716"},{"key":"e_1_3_3_5_9_4_37_2","doi-asserted-by":"crossref","unstructured":"Anish Saxena Saurav Mathur and Moinuddin Qureshi. 2024. Rubix: Reducing the Overhead of Secure Rowhammer Mitigations via Randomized Line-to-Row Mapping(ASPLOS \u201924).","DOI":"10.1145\/3620665.3640404"},{"key":"e_1_3_3_5_9_4_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00049"},{"key":"e_1_3_3_5_9_4_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00022"},{"key":"e_1_3_3_5_9_4_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00022"},{"key":"e_1_3_3_5_9_4_41_2","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat 15 (2015) 71."},{"key":"e_1_3_3_5_9_4_42_2","doi-asserted-by":"crossref","unstructured":"Chihun Song Michael\u00a0Jaemin Kim Tianchen Wang Houxiang Ji Jinghan Huang Ipoom Jeong Jaehyun Park Hwayong Nam Minbok Wi Jung\u00a0Ho Ahn and Nam\u00a0Sung Kim. 2024. TAROT: A CXL SmartNIC-Based Defense Against Multi-bit Errors by Row-Hammer Attacks(ASPLOS \u201924).","DOI":"10.1145\/3620666.3651325"},{"key":"e_1_3_3_5_9_4_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070966"},{"key":"e_1_3_3_5_9_4_44_2","unstructured":"Jeonghyun Woo Chris\u00a0S Lin Prashant\u00a0J Nair Aamer Jaleel and Gururaj Saileshwar. 2025. Qprac: Towards secure and practical prac-based rowhammer mitigation using priority queues. HPCA (2025)."},{"key":"e_1_3_3_5_9_4_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070999"},{"key":"e_1_3_3_5_9_4_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00037"},{"key":"e_1_3_3_5_9_4_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00016"}],"event":{"name":"ISCA '25: Proceedings of the 52nd Annual International Symposium on Computer Architecture","location":"Tokyo Japan","acronym":"SIGARCH '25","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 52nd Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695053.3730997","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695053.3730997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:58:07Z","timestamp":1750503487000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695053.3730997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":46,"alternative-id":["10.1145\/3695053.3730997","10.1145\/3695053"],"URL":"https:\/\/doi.org\/10.1145\/3695053.3730997","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}