Demystifying complex workload-DRAM interactions: An experimental study

S Ghose, T Li, N Hajinazar, DS Cali… - Proceedings of the ACM on …, 2019 - dl.acm.org
It has become increasingly difficult to understand the complex interactions between modern
applications and main memory, composed of Dynamic Random Access Memory (DRAM) …

Chunked-cache: On-demand and scalable cache isolation for security architectures

G Dessouky, A Gruler, P Mahmoody… - arXiv preprint arXiv …, 2021 - arxiv.org
Shared cache resources in multi-core processors are vulnerable to cache side-channel
attacks. Recently proposed defenses have their own caveats: Randomization-based …

[PDF][PDF] Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags

F Gorter, T Kroes, H Bos… - 2024 IEEE Symposium on …, 2024 - download.vusec.net
Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in
C/C++ programs. Despite much research in the area, the performance overhead of (even …

Bcd deduplication: Effective memory compression using partial cache-line deduplication

S Park, I Kang, Y Moon, JH Ahn, GE Suh - Proceedings of the 26th ACM …, 2021 - dl.acm.org
In this paper, we identify new partial data redundancy among multiple cache lines that are
not exploited by traditional memory compression or memory deduplication. We propose …

Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready?

A Mohan, M Ye, H Franke, M Srivatsa… - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
Many applications have been offloaded onto cloud environments to achieve higher agility,
access to more powerful computational resources, and obtain better infrastructure …

A reusable characterization of the memory system behavior of spec2017 and spec2006

M Hassan, CH Park, D Black-Schaffer - ACM Transactions on …, 2021 - dl.acm.org
The SPEC CPU Benchmarks are used extensively for evaluating and comparing
improvements to computer systems. This ubiquity makes characterization critical for …

RAMPART: RowHammer Mitigation and Repair for Server Memory Systems

SC Woo, W Elsasser, M Hamburg, E Linstadt… - Proceedings of the …, 2023 - dl.acm.org
RowHammer attacks are a growing security and reliability concern for DRAMs and computer
systems as they can induce many bit errors that overwhelm error detection and correction …

A Tight Holistic Memory Latency Bound Through Coordinated Management of Memory Resources

S Abdelhalim, D Germchi, M Hossam… - … Conference on Real …, 2023 - drops.dagstuhl.de
To facilitate the safe adoption of multi-core platforms in real-time systems, a plethora of
recent research efforts aim at bounding the delays induced by interference upon accessing …

S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More

R Wang, M Xu, N Asokan - … Conference on Detection of Intrusions and …, 2024 - Springer
Attacks on heap memory are ever-increasing. Existing entropy-based secure memory
allocators can provide statistical defenses against various heap-based exploits, including …

Microarchitectural exploration of STT-MRAM last-level cache parameters for energy-efficient devices

T Marinelli, JIG Pérez, C Tenllado, M Komalan… - ACM Transactions on …, 2022 - dl.acm.org
As the technology scaling advances, limitations of traditional memories in terms of density
and energy become more evident. Modern caches occupy a large part of a CPU physical …