{"id":"https://openalex.org/W4288057786","doi":"https://doi.org/10.1109/sp46214.2022.9833664","title":"ProTRR: Principled yet Optimal In-DRAM Target Row Refresh","display_name":"ProTRR: Principled yet Optimal In-DRAM Target Row Refresh","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4288057786","doi":"https://doi.org/10.1109/sp46214.2022.9833664"},"language":"en","primary_location":{"id":"doi:10.1109/sp46214.2022.9833664","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833664","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/20.500.11850/538482","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018794206","display_name":"Michele Marazzi","orcid":"https://orcid.org/0000-0002-4124-0946"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Michele Marazzi","raw_affiliation_strings":["ETH Z&#x00FC;rich,Computer Security Group"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Computer Security Group","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064410714","display_name":"Patrick Jattke","orcid":"https://orcid.org/0000-0003-2574-907X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Patrick Jattke","raw_affiliation_strings":["ETH Z&#x00FC;rich,Computer Security Group"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Computer Security Group","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052808944","display_name":"Flavien Solt","orcid":"https://orcid.org/0000-0002-0872-5562"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Flavien Solt","raw_affiliation_strings":["ETH Z&#x00FC;rich,Computer Security Group"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Computer Security Group","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082033768","display_name":"Kaveh Razavi","orcid":"https://orcid.org/0000-0002-8588-7100"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaveh Razavi","raw_affiliation_strings":["ETH Z&#x00FC;rich,Computer Security Group"],"affiliations":[{"raw_affiliation_string":"ETH Z&#x00FC;rich,Computer Security Group","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5018794206"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.9798,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.97164511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"735","last_page":"753"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dram","display_name":"Dram","score":0.9506340026855469},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7819146513938904},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6040323972702026},{"id":"https://openalex.org/keywords/row","display_name":"Row","score":0.5821797847747803},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5568573474884033},{"id":"https://openalex.org/keywords/dynamic-random-access-memory","display_name":"Dynamic random-access memory","score":0.5137885212898254},{"id":"https://openalex.org/keywords/universal-memory","display_name":"Universal memory","score":0.4585729241371155},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42856642603874207},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4193093776702881},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.3408210873603821},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13967454433441162},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.09655612707138062},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.08478036522865295}],"concepts":[{"id":"https://openalex.org/C7366592","wikidata":"https://www.wikidata.org/wiki/Q1255620","display_name":"Dram","level":2,"score":0.9506340026855469},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7819146513938904},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6040323972702026},{"id":"https://openalex.org/C135598885","wikidata":"https://www.wikidata.org/wiki/Q1366302","display_name":"Row","level":2,"score":0.5821797847747803},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5568573474884033},{"id":"https://openalex.org/C118702147","wikidata":"https://www.wikidata.org/wiki/Q189396","display_name":"Dynamic random-access memory","level":3,"score":0.5137885212898254},{"id":"https://openalex.org/C195053848","wikidata":"https://www.wikidata.org/wiki/Q7894141","display_name":"Universal memory","level":5,"score":0.4585729241371155},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42856642603874207},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4193093776702881},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.3408210873603821},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13967454433441162},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.09655612707138062},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.08478036522865295},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C63511323","wikidata":"https://www.wikidata.org/wiki/Q908936","display_name":"Interleaved memory","level":4,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/sp46214.2022.9833664","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833664","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},{"id":"pmh:oai:www.research-collection.ethz.ch:20.500.11850/538482","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.11850/538482","pdf_url":null,"source":{"id":"https://openalex.org/S4306402302","display_name":"Repository for Publications and Research Data (ETH Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35440088","host_organization_name":"ETH Zurich","host_organization_lineage":["https://openalex.org/I35440088"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"info:eu-repo/semantics/acceptedVersion"},{"id":"doi:10.3929/ethz-b-000538482","is_oa":true,"landing_page_url":"https://doi.org/10.3929/ethz-b-000538482","pdf_url":null,"source":{"id":"https://openalex.org/S7407051236","display_name":"ETH Z\u00fcrich Research Collection","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"pmh:oai:www.research-collection.ethz.ch:20.500.11850/538482","is_oa":true,"landing_page_url":"http://hdl.handle.net/20.500.11850/538482","pdf_url":null,"source":{"id":"https://openalex.org/S4306402302","display_name":"Repository for Publications and Research Data (ETH Zurich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35440088","host_organization_name":"ETH Zurich","host_organization_lineage":["https://openalex.org/I35440088"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"info:eu-repo/semantics/acceptedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1675727887","https://openalex.org/W1988858501","https://openalex.org/W2006355640","https://openalex.org/W2147657366","https://openalex.org/W2157116240","https://openalex.org/W2163563130","https://openalex.org/W2164586147","https://openalex.org/W2329308213","https://openalex.org/W2420049379","https://openalex.org/W2489077495","https://openalex.org/W2491829854","https://openalex.org/W2505343551","https://openalex.org/W2516668814","https://openalex.org/W2525431465","https://openalex.org/W2537014044","https://openalex.org/W2593313312","https://openalex.org/W2625267941","https://openalex.org/W2648282931","https://openalex.org/W2734814518","https://openalex.org/W2792446208","https://openalex.org/W2794250035","https://openalex.org/W2795139041","https://openalex.org/W2795222486","https://openalex.org/W2796645376","https://openalex.org/W2806638034","https://openalex.org/W2814895833","https://openalex.org/W2886541648","https://openalex.org/W2889929196","https://openalex.org/W2897639728","https://openalex.org/W2899469948","https://openalex.org/W2926775434","https://openalex.org/W2945145734","https://openalex.org/W2949951157","https://openalex.org/W2962726564","https://openalex.org/W2974891422","https://openalex.org/W2999916660","https://openalex.org/W3006586535","https://openalex.org/W3015685940","https://openalex.org/W3042829099","https://openalex.org/W3046609696","https://openalex.org/W3094572750","https://openalex.org/W3102933117","https://openalex.org/W3105648728","https://openalex.org/W3126393290","https://openalex.org/W3147974890","https://openalex.org/W3157056325","https://openalex.org/W3157763265","https://openalex.org/W3205305497","https://openalex.org/W3207641784","https://openalex.org/W4246439759","https://openalex.org/W4288057800","https://openalex.org/W4297740902","https://openalex.org/W6684146691","https://openalex.org/W6720892955","https://openalex.org/W6723169266","https://openalex.org/W6725368715","https://openalex.org/W6751554292","https://openalex.org/W6753951102","https://openalex.org/W6754900045","https://openalex.org/W6756176480","https://openalex.org/W6780767437"],"related_works":["https://openalex.org/W4386903460","https://openalex.org/W2924367614","https://openalex.org/W2161286015","https://openalex.org/W2094308961","https://openalex.org/W2536264121","https://openalex.org/W4382618825","https://openalex.org/W4221167253","https://openalex.org/W2496221128","https://openalex.org/W2516517078","https://openalex.org/W2542824379"],"abstract_inverted_index":{"The":[0],"DRAM":[1,68,75,197,232],"substrate":[2],"is":[3,95,167,243],"becoming":[4],"increasingly":[5],"more":[6],"vulnerable":[7],"to":[8,13,43,98,128,139,149,163,170,186],"Rowhammer":[9,133],"as":[10],"we":[11,136],"move":[12],"smaller":[14],"technology":[15],"nodes.":[16],"We":[17,124,145],"introduce":[18],"ProTRR,":[19],"the":[20,44,47,63,67,72,103,109,114,122,195,199,204,249],"first":[21],"principled":[22,226],"in-DRAM":[23,48],"Target":[24],"Row":[25],"Refresh":[26,251],"mitigation":[27],"with":[28,234,246],"formal":[29],"security":[30],"guarantees":[31],"and":[32,203,218,230,239,248],"low":[33],"bounds":[34],"on":[35],"overhead.":[36],"Unlike":[37],"existing":[38],"proposals":[39],"that":[40,59,77,94,111,135,183,222],"require":[41],"changes":[42],"memory":[45],"controllers,":[46],"nature":[49,65],"of":[50,66,74,161,201,206,216],"ProTRR":[51,60,89,148,157,175,217,223,242],"enables":[52],"its":[53],"seamless":[54],"integration.":[55],"However,":[56],"this":[57,87,106,126,143],"means":[58],"must":[61],"respect":[62],"synchronous":[64],"protocol,":[69],"which":[70,166],"limits":[71],"number":[73,200,205],"rows":[76,110],"can":[78,224],"be":[79,140,150],"protected":[80],"at":[81],"any":[82],"given":[83],"time.":[84],"To":[85,154],"overcome":[86],"challenge,":[88],"proactively":[90],"refreshes":[91],"each":[92,164],"row":[93],"most":[96],"likely":[97],"observe":[99],"bit":[100],"flips":[101],"in":[102,142,172,255],"future.":[104],"While":[105],"strategy":[107],"catches":[108],"are":[112],"hammered":[113],"most,":[115],"some":[116],"others":[117],"may":[118],"still":[119],"fly":[120],"under":[121],"radar.":[123],"use":[125],"observation":[127],"construct":[129],"Feinting,":[130],"a":[131,177,188,235],"new":[132,178,250],"attack":[134],"formally":[137],"prove":[138],"optimal":[141,190],"setting.":[144],"then":[146],"conFigure":[147],"secure":[151],"against":[152],"Feinting.":[153],"achieve":[155],"this,":[156],"should":[158],"keep":[159],"track":[160],"accesses":[162],"row,":[165],"prohibitively":[168],"expensive":[169],"implement":[171],"hardware.":[173],"Instead,":[174],"uses":[176],"frequent":[179],"item":[180],"counting":[181],"scheme":[182],"leverages":[184],"Feinting":[185],"provide":[187,225],"provably":[189],"yet":[191],"flexible":[192],"trade-off":[193],"between":[194],"tolerated":[196],"vulnerability,":[198],"counters,":[202],"additional":[207],"refreshes.":[208],"Our":[209],"extensive":[210],"evaluation":[211],"using":[212],"an":[213],"ASIC":[214],"implementation":[215],"cycle-accurate":[219],"simulation":[220],"shows":[221],"protection":[227],"for":[228],"current":[229],"future":[231],"technologies":[233],"negligible":[236],"performance,":[237],"power,":[238],"area":[240],"impact.":[241],"fully":[244],"compatible":[245],"DDR4":[247],"Management":[252],"(RFM)":[253],"extension":[254],"DDR5.":[256]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":5}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
