From chatgpt to threatgpt: Impact of generative ai in cybersecurity and privacy

M Gupta, CK Akiri, K Aryal, E Parker, L Praharaj - IEEE Access, 2023 - ieeexplore.ieee.org
Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital
transformation in the year 2022. As the different GenAI models like ChatGPT and Google …

Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

A modern primer on processing in memory

O Mutlu, S Ghose, J Gómez-Luna… - … computing: from devices …, 2022 - Springer
Modern computing systems are overwhelmingly designed to move data to computation. This
design choice goes directly against at least three key trends in computing that cause …

TRRespass: Exploiting the many sides of target row refresh

P Frigo, E Vannacc, H Hassan… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

W Wang, G Chen, X Pan, Y Zhang, XF Wang… - Proceedings of the …, 2017 - dl.acm.org
Side-channel risks of Intel SGX have recently attracted great attention. Under the spotlight is
the newly discovered page-fault attack, in which an OS-level adversary induces page faults …

Rowhammer: A retrospective

O Mutlu, JS Kim - … Transactions on Computer-Aided Design of …, 2019 - ieeexplore.ieee.org
This retrospective paper describes the RowHammer problem in dynamic random access
memory (DRAM), which was initially introduced by Kim et al. at the ISCA 2014 Conference …

Error characterization, mitigation, and recovery in flash-memory-based solid-state drives

Y Cai, S Ghose, EF Haratsch, Y Luo… - Proceedings of the …, 2017 - ieeexplore.ieee.org
NAND flash memory is ubiquitous in everyday life today because its capacity has
continuously increased and cost has continuously decreased over decades. This positive …

{DRAMA}: Exploiting {DRAM} addressing for {Cross-CPU} attacks

P Pessl, D Gruss, C Maurice, M Schwarz… - 25th USENIX security …, 2016 - usenix.org
In cloud computing environments, multiple tenants are often co-located on the same multi-
processor system. Thus, preventing information leakage between tenants is crucial. While …

Rowpress: Amplifying read disturbance in modern dram chips

H Luo, A Olgun, AG Yağlıkçı, YC Tuğrul… - Proceedings of the 50th …, 2023 - dl.acm.org
Memory isolation is critical for system reliability, security, and safety. Unfortunately, read
disturbance can break memory isolation in modern DRAM chips. For example, RowHammer …

Drammer: Deterministic rowhammer attacks on mobile platforms

V Van Der Veen, Y Fratantonio, M Lindorfer… - Proceedings of the …, 2016 - dl.acm.org
Recent work shows that the Rowhammer hardware bug can be used to craft powerful
attacks and completely subvert a system. However, existing efforts either describe …