Y. Kim and O. Mutlu, “Memory Systems,” Computing Handbook, 2014.
Suggested readings (Lecture 26):
Bruce Jacob and Trevor Mudge, “Virtual Memory: Issues of Implementation,” IEEE Computer, 1998.
Nastaran Hajinazar, Pratyush Patel, Minesh Patel, Konstantinos Kanellopoulos, Saugata Ghose, Rachata Ausavarungnirun, Geraldo Francisco de Oliveira Jr., Jonathan Appavoo, Vivek Seshadri, and Onur Mutlu, “The Virtual Block Interface: A Flexible Alternative to the Conventional Virtual Memory Framework,” In ISCA, 2020.
Mentioned in Lecture 26:
Eiman Ebrahimi, Onur Mutlu, and Yale N. Patt, “Techniques for Bandwidth Efficient Prefetching of Linked Data Structures in Hybrid Prefetching Systems” in HPCA 2009.
Eiman Ebrahimi, Onur Mutlu, Chang Joo Lee, and Yale N. Patt, “Coordinated Control of Multiple Prefetchers in Multi Core Systems” in MICRO 2009.
Eiman Ebrahimi , Chang Joo Lee, Onur Mutlu, and Yale N. Patt, “Prefetch Aware Shared Resource Management for Multi Core Systems” in ISCA 2011
Chang Joo Lee, Onur Mutlu, Veynu Narasiman , and Yale N. Patt, “Prefetch Aware DRAM Controllers” in MICRO 2008.
Chang Joo Lee, Veynu Narasiman Onur Mutlu, and Yale N. Patt, “Improving Memory Bank Level Parallelism in the Presence of Prefetching” in MICRO 2009.
Vivek Seshadri, Samihan Yedkar , Hongyi Xin, Onur Mutlu, Phillip P. Gibbons, Michael A. Kozuch , and Todd C. Mowry, “Mitigating Prefetcher Caused Pollution using Informed Caching Policies for Prefetched Blocks” in TACO 2015.
Adwait Jog, Onur Kayiran , Asit K. Mishra, Mahmut T. Kandemir, Onur Mutlu, Ravishankar Iyer, and Chita R. Das, “Orchestrated Scheduling and Prefetching for GPGPUs” in ISCA 2013.
Y. Kim, R. Daly, J. Kim, C. Fallin, J.H. Lee, D. Lee, C. Wilkerson, K. Lai, O. Mutlu, “Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors,” ISCA 2014
M. Seaborn and T. Dullien, “Exploiting the DRAM rowhammer bug to gain kernel privileges,” Google Project Zero, 2015
V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, C. Giuffrida, “Drammer: Deterministic Rowhammer Attacks on Mobile Platforms,” CCS 2016
Tatar, Andrei, Radhesh Krishnan Konoth, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. “Throwhammer: Rowhammer attacks over the network and defenses.” In USENIX ATC, 2018
Yao, Fan, Adnan Siraj Rakin, and Deliang Fan. “Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips.” In USENIX Security, 2020
O. Mutlu, J. Kim, “RowHammer: A Retrospective,” TCAD 2019
Frigo, Pietro, Emanuele Vannacc, Hasan Hassan, Victor Van Der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, and Kaveh Razavi. “TRRespass: Exploiting the many sides of target row refresh.” In IEEE SP, 2020.
Cojocar, Lucian, Jeremie Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, and Onur Mutlu. “Are we susceptible to rowhammer? an end-to-end methodology for cloud providers.” In IEEE SP, 2020
Hasan Hassan, Yahya Can Tugrul , Jeremie S. Kim, Victor van der Veen, Kaveh Razavi, and Onur Mutlu, “Uncovering In DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications” in MICRO 2021.