SIMDRAM: A framework for bit-serial SIMD processing using DRAM

N Hajinazar, GF Oliveira, S Gregorio… - Proceedings of the 26th …, 2021 - dl.acm.org
Processing-using-DRAM has been proposed for a limited set of basic operations (ie, logic
operations, addition). However, in order to enable full adoption of processing-using-DRAM …

Uncovering in-dram rowhammer protection mechanisms: A new methodology, custom rowhammer patterns, and implications

H Hassan, YC Tugrul, JS Kim, V Van der Veen… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect
against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips …

Blockhammer: Preventing rowhammer at low cost by blacklisting rapidly-accessed dram rows

AG Yağlikçi, M Patel, JS Kim, R Azizi… - … Symposium on High …, 2021 - ieeexplore.ieee.org
Aggressive memory density scaling causes modern DRAM devices to suffer from
RowHammer, a phenomenon where rapidly activating (ie, hammering) a DRAM row can …

DAMOV: A new methodology and benchmark suite for evaluating data movement bottlenecks

GF Oliveira, J Gómez-Luna, L Orosa, S Ghose… - IEEE …, 2021 - ieeexplore.ieee.org
Data movement between the CPU and main memory is a first-order obstacle against improv
ing performance, scalability, and energy efficiency in modern systems. Computer systems …

A deeper look into rowhammer's sensitivities: Experimental analysis of real dram chips and implications on future attacks and defenses

L Orosa, AG Yaglikci, H Luo, A Olgun, J Park… - MICRO-54: 54th Annual …, 2021 - dl.acm.org
RowHammer is a circuit-level DRAM vulnerability where repeatedly accessing (ie,
hammering) a DRAM row can cause bit flips in physically nearby rows. The RowHammer …

Graphminesuite: Enabling high-performance and programmable graph mining algorithms with set algebra

M Besta, Z Vonarburg-Shmaria, Y Schaffner… - arXiv preprint arXiv …, 2021 - arxiv.org
We propose GraphMineSuite (GMS): the first benchmarking suite for graph mining that
facilitates evaluating and constructing high-performance graph mining algorithms. First …

Security Analysis of the Silver Bullet Technique for RowHammer Prevention

AG Yağlıkçı, JS Kim, F Devaux, O Mutlu - arXiv preprint arXiv:2106.07084, 2021 - arxiv.org
The purpose of this document is to study the security properties of the Silver Bullet algorithm
against worst-case RowHammer attacks. We mathematically demonstrate that Silver Bullet …

Aging-aware request scheduling for non-volatile main memory

S Song, A Das, O Mutlu, N Kandasamy - … of the 26th Asia and South …, 2021 - dl.acm.org
Modern computing systems are embracing non-volatile memory (NVM) to implement high-
capacity and low-cost main memory. Elevated operating voltages of NVM accelerate the …

Intelligent architectures for intelligent computing systems

O Mutlu - 2021 Design, Automation & Test in Europe …, 2021 - ieeexplore.ieee.org
Computing is bottlenecked by data. Large amounts of application data overwhelm storage
capability, communication capability, and computation capability of the modern machines …

A survey of non-volatile main memory technologies: State-of-the-arts, practices, and future directions

HK Liu, D Chen, H Jin, XF Liao, B He, K Hu… - Journal of Computer …, 2021 - Springer
Abstract Non-Volatile Main Memories (NVMMs) have recently emerged as a promising
technology for future memory systems. Generally, NVMMs have many desirable properties …