A modern primer on processing in memory

O Mutlu, S Ghose, J Gómez-Luna… - … computing: from devices …, 2022 - Springer
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …

TRRespass: Exploiting the many sides of target row refresh

P Frigo, E Vannacc, H Hassan… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …

Rowhammer: A retrospective

O Mutlu, JS Kim - … Transactions on Computer-Aided Design of …, 2019 - ieeexplore.ieee.org
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …

Rowpress: Amplifying read disturbance in modern dram chips

H Luo, A Olgun, AG Yağlıkçı, YC Tuğrul… - Proceedings of the 50th …, 2023 - dl.acm.org
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …

{SMASH}: Synchronized many-sided rowhammer attacks from {JavaScript}

F de Ridder, P Frigo, E Vannacci, H Bos… - 30th USENIX Security …, 2021 - usenix.org
Despite their in-DRAM Target Row Refresh (TRR) mitigations, some of the most recent
DDR4 modules are still vulnerable to many-sided Rowhammer bit flips. While these bit flips …

Protrr: Principled yet optimal in-dram target row refresh

M Marazzi, P Jattke, F Solt… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The DRAM substrate is becoming increasingly more vulnerable to Rowhammer as we move
to smaller technology nodes. We introduce ProTRR, the first principled in-DRAM Target Row …

Are we susceptible to rowhammer? an end-to-end methodology for cloud providers

L Cojocar, J Kim, M Patel, L Tsai… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
Cloud providers are concerned that Rowhammer poses a potentially critical threat to their
servers, yet today they lack a systematic way to test whether the DRAM used in their servers …

Fundamentally understanding and solving rowhammer

O Mutlu, A Olgun, AG Yağlıkcı - Proceedings of the 28th Asia and South …, 2023 - dl.acm.org
We provide an overview of recent developments and future directions in the RowHammer
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …

Jolt: Recovering tls signing keys via rowhammer faults

K Mus, Y Doröz, MC Tol, K Rahman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …

[PDF][PDF] Digital signature standard (DSS)

F PUB - Fips pub, 2000 - csrc.nist.rip
This standard specifies a suite of algorithms which can be used to generate a digital
signature. Digital signatures are used to detect unauthorized modifications to data and to …