A survey on machine-learning based security design for cyber-physical systems

S Kim, KJ Park - Applied Sciences, 2021 - mdpi.com
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …

A survey of bit-flip attacks on deep neural network and corresponding defense methods

C Qian, M Zhang, Y Nie, S Lu, H Cao - Electronics, 2023 - mdpi.com
As the machine learning-related technology has made great progress in recent years, deep
neural networks are widely used in many scenarios, including security-critical ones, which …

Revisiting rowhammer: An experimental analysis of modern dram devices and mitigation techniques

JS Kim, M Patel, AG Yağlıkçı, H Hassan… - 2020 ACM/IEEE 47th …, 2020 - ieeexplore.ieee.org
RowHammer is a circuit-level DRAM vulnerability, first rigorously analyzed and introduced in
2014, where repeatedly accessing data in a DRAM row can cause bit flips in nearby rows …

Moesi-prime: preventing coherence-induced hammering in commodity workloads

K Loughlin, S Saroiu, A Wolman, YA Manerkar… - Proceedings of the 49th …, 2022 - dl.acm.org
Prior work shows that Rowhammer attacks---which flip bits in DRAM via frequent activations
of the same row (s)---are viable. Adversaries typically mount these attacks via instruction …

[PDF][PDF] Panopticon: A complete in-dram rowhammer mitigation

T Bennett, S Saroiu, A Wolman… - Workshop on DRAM …, 2021 - alecw.azurewebsites.net
The shortcomings of previous Rowhammer mitigations prevent their adoption in practice.
Their implementations either need significant amounts of fast memory, such as CAM or …

Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer

K Loughlin, J Rosenblum, S Saroiu, A Wolman… - Proceedings of the 29th …, 2023 - dl.acm.org
Today's cloud DRAM lacks strong isolation primitives, highlighted by Rowhammer bit flips.
Rowhammer poses an increasing threat to cloud security/reliability, given (1) DRAM …

The price of secrecy: How hiding internal DRAM topologies hurts rowhammer defenses

S Saroiu, A Wolman, L Cojocar - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
DRAM vendors today choose to keep the internal topologies of DRAM devices secret. This
decision introduces significant practical challenges for designers of memory controllers who …

Stop! hammer time: rethinking our approach to rowhammer mitigations

K Loughlin, S Saroiu, A Wolman, B Kasikci - Proceedings of the …, 2021 - dl.acm.org
Rowhammer attacks exploit electromagnetic interference among nearby DRAM cells to flip
bits, corrupting data and altering system behavior. Unfortunately, DRAM vendors have opted …

Machine learning-based Rowhammer mitigation

BK Joardar, TK Bletsch… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Rowhammer is a security vulnerability that arises due to the undesirable electrical
interaction between physically adjacent rows in DRAMs. Bit flips caused by Rowhammer …

Vulnerability assessment of the rowhammer attack using machine learning and the gem5 simulator-work in progress

L France, M Mushtaq, F Bruguier, D Novo… - Proceedings of the 2021 …, 2021 - dl.acm.org
Modern computer memories have been shown to have reliability issues. The main memory
is the target of a security attack called Rowhammer, which causes bit flips in adjacent victim …