Michael Jaemin Kim
YOU?
Author Swipe
View article: Per-Row Activation Counting on Real Hardware: Demystifying Performance Overheads
Per-Row Activation Counting on Real Hardware: Demystifying Performance Overheads Open
Per-Row Activation Counting (PRAC), a DRAM read disturbance mitigation method, modifies key DRAM timing parameters, reportedly causing significant performance overheads in simulator-based studies. However, given known discrepancies between…
View article: Marionette: A RowHammer Attack via Row Coupling
Marionette: A RowHammer Attack via Row Coupling Open
View article: DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands
DRAMScope: Uncovering DRAM Microarchitecture and Characteristics by Issuing Memory Commands Open
The demand for precise information on DRAM microarchitectures and error characteristics has surged, driven by the need to explore processing in memory, enhance reliability, and mitigate security vulnerability. Nonetheless, DRAM manufacture…
View article: How to Kill the Second Bird with One ECC: The Pursuit of Row Hammer Resilient DRAM
How to Kill the Second Bird with One ECC: The Pursuit of Row Hammer Resilient DRAM Open
Error-correcting code (ECC) has been widely used in DRAM-based memory systems to address the exacerbating random errors following the fabrication process scaling. However, ECCs including the strong form of Chipkill have not been so effecti…
View article: X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands
X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands Open
The demand for accurate information about the internal structure and characteristics of dynamic random-access memory (DRAM) has been on the rise. Recent studies have explored the structure and characteristics of DRAM to improve processing …
View article: Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh
Mithril: Cooperative Row Hammer Protection on Commodity DRAM Leveraging Managed Refresh Open
Since its public introduction in the mid-2010s, the Row Hammer (RH) phenomenon has drawn significant attention from the research community due to its security implications. Although many RH-protection schemes have been proposed by processo…