Jeremie S. Kim
YOU?
Author Swipe
View article: SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations
SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations Open
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row solely by accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly vulnerable to …
View article: ApHMM: Accelerating Profile Hidden Markov Models for Fast and Energy-efficient Genome Analysis
ApHMM: Accelerating Profile Hidden Markov Models for Fast and Energy-efficient Genome Analysis Open
Profile hidden Markov models (pHMMs) are widely employed in various bioinformatics applications to identify similarities between biological sequences, such as DNA or protein sequences. In pHMMs, sequences are represented as graph structure…
View article: BLEND: a fast, memory-efficient and accurate mechanism to find fuzzy seed matches in genome analysis
BLEND: a fast, memory-efficient and accurate mechanism to find fuzzy seed matches in genome analysis Open
Generating the hash values of short subsequences, called seeds, enables quickly identifying similarities between genomic sequences by matching seeds with a single lookup of their hash values. However, these hash values can be used only for…
View article: BLEND: a fast, memory-efficient and accurate mechanism to find fuzzy seed matches in genome analysis
BLEND: a fast, memory-efficient and accurate mechanism to find fuzzy seed matches in genome analysis Open
Generating the hash values of short subsequences, called seeds, enables quickly identifying similarities between genomic sequences by matching seeds with a single lookup of their hash values. However, these hash values can be used only for…
View article: BLEND: A Fast, Memory-Efficient, and Accurate Mechanism to Find Fuzzy Seed Matches in Genome Analysis
BLEND: A Fast, Memory-Efficient, and Accurate Mechanism to Find Fuzzy Seed Matches in Genome Analysis Open
Generating the hash values of short subsequences, called seeds, enables quickly identifying similarities between genomic sequences by matching seeds with a single lookup of their hash values. However, these hash values can be used only for…
View article: RevaMp3D: Architecting the Processor Core and Cache Hierarchy for Systems with Monolithically-Integrated Logic and Memory
RevaMp3D: Architecting the Processor Core and Cache Hierarchy for Systems with Monolithically-Integrated Logic and Memory Open
Recent nano-technological advances enable the Monolithic 3D (M3D) integration of multiple memory and logic layers in a single chip, allowing for fine-grained connections between layers and significantly alleviating main memory bottlenecks.…
View article: FastRemap: a tool for quickly remapping reads between genome assemblies
FastRemap: a tool for quickly remapping reads between genome assemblies Open
Motivation A genome read dataset can be quickly and efficiently remapped from one reference to another similar reference (e.g., between two reference versions or two similar species) using a variety of tools, e.g., the commonly used CrossM…
View article: pLUTo: Enabling Massively Parallel Computation In DRAM via Lookup Tables
pLUTo: Enabling Massively Parallel Computation In DRAM via Lookup Tables Open
Data movement between the main memory and the processor is a key contributor to execution time and energy consumption in memory-intensive applications. This data movement bottleneck can be alleviated using Processing-in-Memory (PiM). One c…
View article: Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices
Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices Open
RowHammer is a circuit-level DRAM vulnerability, where repeatedly activating and precharging a DRAM row, and thus alternating the voltage of a row's wordline between low and high voltage levels, can cause bit flips in physically nearby row…
View article: COVIDHunter: COVID-19 Pandemic Wave Prediction and Mitigation via Seasonality Aware Modeling
COVIDHunter: COVID-19 Pandemic Wave Prediction and Mitigation via Seasonality Aware Modeling Open
Early detection and isolation of COVID-19 patients are essential for successful implementation of mitigation strategies and eventually curbing the disease spread. With a limited number of daily COVID-19 tests performed in every country, si…
View article: COVIDHunter: COVID-19 pandemic wave prediction and mitigation via seasonality-aware modeling
COVIDHunter: COVID-19 pandemic wave prediction and mitigation via seasonality-aware modeling Open
Early detection and isolation of COVID-19 patients are essential for successful implementation of mitigation strategies and eventually curbing the disease spread. With a limited number of daily COVID-19 tests performed in every country, si…
View article: AgileWatts: An Energy-Efficient CPU Core Idle-State Architecture for Latency-Sensitive Server Applications
AgileWatts: An Energy-Efficient CPU Core Idle-State Architecture for Latency-Sensitive Server Applications Open
User-facing applications running in modern datacenters exhibit irregular request patterns and are implemented using a multitude of services with tight latency requirements. These characteristics render ineffective existing energy conservin…
View article: FastRemap: A Tool for Quickly Remapping Reads between Genome Assemblies
FastRemap: A Tool for Quickly Remapping Reads between Genome Assemblies Open
A genome read data set can be quickly and efficiently remapped from one reference to another similar reference (e.g., between two reference versions or two similar species) using a variety of tools, e.g., the commonly-used CrossMap tool. W…
View article: FastRemap: A Tool for Quickly Remapping Reads between Genome Assemblies
FastRemap: A Tool for Quickly Remapping Reads between Genome Assemblies Open
A genome read data set can be quickly and eciently remapped from one reference to another similar reference (e.g., between two reference versions or two similar species) using a variety of tools, e.g., the commonly-used CrossMap tool. With…
View article: FastRemap: A Tool for Quickly Remapping Reads between Genome Assemblies
FastRemap: A Tool for Quickly Remapping Reads between Genome Assemblies Open
A genome read data set can be quickly and eciently remapped from one reference to another similar reference (e.g., between two reference versions or two similar species) using a variety of tools, e.g., the commonly-used CrossMap tool. With…
View article: DR-STRaNGe: End-to-End System Design for DRAM-based True Random Number Generators
DR-STRaNGe: End-to-End System Design for DRAM-based True Random Number Generators Open
Random number generation is an important task in a wide variety of critical applications including cryptographic algorithms, scientific simulations, and industrial testing tools. True Random Number Generators (TRNGs) produce truly random d…
View article: DarkGates: A Hybrid Power-Gating Architecture to Mitigate the Performance Impact of Dark-Silicon in High Performance Processors
DarkGates: A Hybrid Power-Gating Architecture to Mitigate the Performance Impact of Dark-Silicon in High Performance Processors Open
To reduce the leakage power of inactive (dark) silicon components, modern processor systems shut-off these components' power supply using low-leakage transistors, called power-gates. Unfortunately, power-gates increase the system's power-d…
View article: BLEND: A Fast, Memory-Efficient, and Accurate Mechanism to Find Fuzzy Seed Matches in Genome Analysis
BLEND: A Fast, Memory-Efficient, and Accurate Mechanism to Find Fuzzy Seed Matches in Genome Analysis Open
Generating the hash values of short subsequences, called seeds, enables quickly identifying similarities between genomic sequences by matching seeds with a single lookup of their hash values. However, these hash values can be used only for…
View article: Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology,\n Custom RowHammer Patterns, and Implications
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology,\n Custom RowHammer Patterns, and Implications Open
The RowHammer vulnerability in DRAM is a critical threat to system security.\nTo protect against RowHammer, vendors commit to security-through-obscurity:\nmodern DRAM chips rely on undocumented, proprietary, on-die mitigations,\ncommonly k…
View article: A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses
A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses Open
RowHammer is a circuit-level DRAM vulnerability where repeatedly accessing (i.e., hammering) a DRAM row can cause bit flips in physically nearby rows. The RowHammer vulnerability worsens as DRAM cell size and cell-to-cell spacing shrink. R…
View article: Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications
Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications Open
The RowHammer vulnerability in DRAM is a critical threat to system security. To protect against RowHammer, vendors commit to security-through-obscurity: modern DRAM chips rely on undocumented, proprietary, on-die mitigations, commonly know…
View article: Improving DRAM Performance, Security, and Reliability by Understanding and Exploiting DRAM Timing Parameter Margins
Improving DRAM Performance, Security, and Reliability by Understanding and Exploiting DRAM Timing Parameter Margins Open
This dissertation rigorously characterizes many modern commodity DRAM devices and shows that by exploiting DRAM access timing margins within manufacturer-recommended DRAM timing specifications, we can significantly improve system performan…
View article: Security Analysis of the Silver Bullet Technique for RowHammer Prevention
Security Analysis of the Silver Bullet Technique for RowHammer Prevention Open
The purpose of this document is to study the security properties of the Silver Bullet algorithm against worst-case RowHammer attacks. We mathematically demonstrate that Silver Bullet, when properly configured and implemented in a DRAM chip…
View article: CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities\n and Optimizations
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities\n and Optimizations Open
DRAM is the dominant main memory technology used in modern computing systems.\nComputing systems implement a memory controller that interfaces with DRAM via\nDRAM commands. DRAM executes the given commands using internal components\n(e.g.,…
View article: QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips
QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips Open
True random number generators (TRNG) sample random physical processes to create large amounts of random numbers for various use cases, including security-critical cryptographic primitives, scientific simulations, machine learning applicati…
View article: IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors
IChannels: Exploiting Current Management Mechanisms to Create Covert Channels in Modern Processors Open
To operate efficiently across a wide range of workloads with varying power requirements, a modern processor applies different current management mechanisms, which briefly throttle instruction execution while they adjust voltage and frequen…
View article: CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations Open
DRAM is the dominant main memory technology used in modern computing systems. Computing systems implement a memory controller that interfaces with DRAM via DRAM commands. DRAM executes the given commands using internal components (e.g., ac…
View article: QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple\n Row Activation in Commodity DRAM Chips
QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple\n Row Activation in Commodity DRAM Chips Open
True random number generators (TRNG) sample random physical processes to\ncreate large amounts of random numbers for various use cases, including\nsecurity-critical cryptographic primitives, scientific simulations, machine\nlearning applic…
View article: pLUTo: In-DRAM Lookup Tables to Enable Massively Parallel General-Purpose Computation.
pLUTo: In-DRAM Lookup Tables to Enable Massively Parallel General-Purpose Computation. Open
Data movement between main memory and the processor is a significant contributor to the execution time and energy consumption of memory-intensive applications. This data movement bottleneck can be alleviated using Processing-in-Memory (PiM…
View article: pLUTo: Enabling Massively Parallel Computation in DRAM via Lookup Tables
pLUTo: Enabling Massively Parallel Computation in DRAM via Lookup Tables Open
Data movement between the main memory and the processor is a key contributor to execution time and energy consumption in memory-intensive applications. This data movement bottleneck can be alleviated using Processing-in-Memory (PiM). One c…