[HTML][HTML] Security threats to agricultural artificial intelligence: Position and perspective

Y Gao, SA Camtepe, NH Sultan, HT Bui… - … and Electronics in …, 2024 - Elsevier
In light of their remarkable predictive capabilities, artificial intelligence (AI) models driven by
deep learning (DL) have witnessed widespread adoption in the agriculture sector …

Fundamentally understanding and solving rowhammer

O Mutlu, A Olgun, AG Yağlıkcı - Proceedings of the 28th Asia and South …, 2023 - dl.acm.org
We provide an overview of recent developments and future directions in the RowHammer
vulnerability that plagues modern DRAM (Dynamic Random Memory Access) chips, which …

HiRA: Hidden row activation for reducing refresh latency of off-the-shelf DRAM chips

AG Yağlikçi, A Olgun, M Patel, H Luo… - 2022 55th IEEE/ACM …, 2022 - ieeexplore.ieee.org
DRAM is the building block of modern main memory systems. DRAM cells must be
periodically refreshed to prevent data loss. Refresh operations degrade system performance …

DRAM bender: An extensible and versatile FPGA-based infrastructure to easily test state-of-the-art DRAM chips

A Olgun, H Hassan, AG Yağlıkçı… - … on Computer-Aided …, 2023 - ieeexplore.ieee.org
To understand and improve DRAM performance, reliability, security, and energy efficiency,
prior works study characteristics of commodity DRAM chips. Unfortunately, state-of-the-art …

[PDF][PDF] Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.

A Di Dio, K Koning, H Bos, C Giuffrida - NDSS, 2023 - ndss-symposium.org
Despite nearly decade-long mitigation efforts in academia and industry, the community is yet
to find a practical solution to the Rowhammer vulnerability. Comprehensive software …

Deepvenom: Persistent dnn backdoors exploiting transient weight perturbations in memories

K Cai, MHI Chowdhuryy, Z Zhang… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Backdoor attacks have raised significant concerns in machine learning (ML) systems.
Mainstream ML backdoor attacks typically involve either poisoning the victim's training …

[PDF][PDF] Panopticon: A complete in-dram rowhammer mitigation

T Bennett, S Saroiu, A Wolman… - Workshop on DRAM …, 2021 - alecw.azurewebsites.net
The shortcomings of previous Rowhammer mitigations prevent their adoption in practice.
Their implementations either need significant amounts of fast memory, such as CAM or …

Siloz: Leveraging DRAM Isolation Domains to Prevent Inter-VM Rowhammer

K Loughlin, J Rosenblum, S Saroiu, A Wolman… - Proceedings of the 29th …, 2023 - dl.acm.org
Today's cloud DRAM lacks strong isolation primitives, highlighted by Rowhammer bit flips.
Rowhammer poses an increasing threat to cloud security/reliability, given (1) DRAM …

A hybrid alias analysis and its application to global variable protection in the linux kernel

G Li, H Zhang, J Zhou, W Shen, Y Sui… - 32nd USENIX Security …, 2023 - usenix.org
Global variables in the Linux kernel have been a common target of memory corruption
attacks to achieve privilege escalation. Several potential defense mechanisms can be …

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses

Z Zhang, W He, Y Cheng, W Wang… - … on Dependable and …, 2022 - ieeexplore.ieee.org
Rowhammer is a hardware vulnerability in DRAM memory, where repeated access to
hammer rows can induce bit flips in neighboring victim rows. Rowhammer attacks have …