2011 IEEE 17th International Symposium on High Performance Computer Architecture 2011
DOI: 10.1109/hpca.2011.5749753
|View full text |Cite
|
Sign up to set email alerts
|

Practical and secure PCM systems by online detection of malicious write streams

Abstract: International audienc

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0
2

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 69 publications
(49 citation statements)
references
References 10 publications
0
47
0
2
Order By: Relevance
“…Repeated address attack: This issues repeated writes to a physical address (PA) to make it fail. By changing the write-pattern, several variants of this attack can be created [10]. 2.…”
Section: Techniques For Mitigating Write Attacks Techniques For Reducmentioning
confidence: 99%
See 2 more Smart Citations
“…Repeated address attack: This issues repeated writes to a physical address (PA) to make it fail. By changing the write-pattern, several variants of this attack can be created [10]. 2.…”
Section: Techniques For Mitigating Write Attacks Techniques For Reducmentioning
confidence: 99%
“…Qureshi et al [10] note that while lowering the rate of WL leaves the system vulnerable to attacks, increasing the WL rate write overhead greatly, even for benign processes. Hence, they propose that the WL rate should be decided by the nature of memory access stream such that it is low/high for common/attacking programs, respectively.…”
Section: Detecting Write Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Wear leveling techniques that aim to evenly distribute write activities include hot/cold line shifting and segment swapping [5], randomized mapping such as StartGap [17] and Security Refresh [18], and adaptive wear leveling with online attack detector [19]. To defend against malicious attacks, randomized approaches have been proposed to randomly distribute writes [17][18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [138] offered a countermeasure for the PCM write threat according to which either the number of write operations is reduced or a "wear-leveling" is used to "write uniformly". A few examples of wear-leveling methods include the randomized region-based Start-Gap [139], the multi-level Security Refresh [140], and Online Attack Detection [141]. These methods suffer from high write or extra hardware overheads due to their frequent need in swapping data for speeding up the process of remapping logical to physical addresses.…”
Section: Emerging Memory Securitymentioning
confidence: 99%