Flexible auto-refresh: Enabling scalable and energy-efficient DRAM refresh reductions

I Bhati, Z Chishti, SL Lu, B Jacob - Proceedings of the 42nd Annual …, 2015 - dl.acm.org
DRAM cells require periodic refreshing to preserve data. In JEDEC DDRx devices, a refresh
operation is performed via an auto-refresh command, which refreshes multiple rows in …

Solar-DRAM: Reducing DRAM access latency by exploiting the variation in local bitlines

J Kim, M Patel, H Hassan… - 2018 IEEE 36th …, 2018 - ieeexplore.ieee.org
DRAM latency is a major bottleneck for many applications in modern computing systems. In
this work, we rigorously characterize the effects of reducing DRAM access latency on 282 …

Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer

K Loughlin, J Rosenblum, S Saroiu, A Wolman… - Proceedings of the 29th …, 2023 - dl.acm.org
Today's cloud DRAM lacks strong isolation primitives, highlighted by Rowhammer bit flips.
Rowhammer poses an increasing threat to cloud security/reliability, given (1) DRAM …

Functionally-Complete Boolean Logic in Real DRAM Chips: Experimental Characterization and Analysis

İE Yüksel, YC Tuğrul, A Olgun… - … Symposium on High …, 2024 - ieeexplore.ieee.org
Processing-using-DRAM (PuD) is an emerging paradigm that leverages the analog
operational properties of DRAM circuitry to enable massively parallel in-DRAM computation …

Enabling the adoption of processing-in-memory: Challenges, mechanisms, future research directions

S Ghose, K Hsieh, A Boroumand… - arXiv preprint arXiv …, 2018 - arxiv.org
Poor DRAM technology scaling over the course of many years has caused DRAM-based
main memory to increasingly become a larger system bottleneck. A major reason for the …

SpyHammer: Using RowHammer to remotely spy on temperature

L Orosa, U Rührmair, AG Yaglikci, H Luo… - arXiv preprint arXiv …, 2022 - arxiv.org
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just
accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate …

Signature correction attack on dilithium signature scheme

S Islam, K Mus, R Singh, P Schaumont… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
Motivated by the rise of quantum computers, existing public-key cryptosystems are expected
to be replaced by post-quantum schemes in the next decade in billions of devices. To …

Codic: A low-cost substrate for enabling custom in-dram functionalities and optimizations

L Orosa, Y Wang, M Sadrosadati, JS Kim… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
DRAM is the dominant main memory technology used in modern computing systems.
Computing systems implement a memory controller that interfaces with DRAM via DRAM …

Counter-based tree structure for row hammering mitigation in DRAM

SM Seyedzadeh, AK Jones… - IEEE Computer …, 2016 - ieeexplore.ieee.org
Scaling down DRAM technology degrades cell reliability due to increased coupling between
adjacent DRAM cells, commonly referred to as crosstalk. Moreover, high access frequency …

Buddy-RAM: Improving the performance and efficiency of bulk bitwise operations using DRAM

V Seshadri, D Lee, T Mullins, H Hassan… - arXiv preprint arXiv …, 2016 - arxiv.org
Bitwise operations are an important component of modern day programming. Many widely-
used data structures (eg, bitmap indices in databases) rely on fast bitwise operations on …