{"id":"https://openalex.org/W3214385046","doi":"https://doi.org/10.1109/tifs.2021.3124728","title":"BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability","display_name":"BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3214385046","doi":"https://doi.org/10.1109/tifs.2021.3124728","mag":"3214385046"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3124728","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3124728","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100410710","display_name":"Zhi Zhang","orcid":"https://orcid.org/0000-0003-3604-5369"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zhi Zhang","raw_affiliation_strings":["Data61, CSIRO. (e-mail: zhi.zhang@data61.csiro.au)","Data61, CSIRO, Sydney, NSW, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO. (e-mail: zhi.zhang@data61.csiro.au)","institution_ids":["https://openalex.org/I42894916"]},{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014677031","display_name":"He Wei","orcid":"https://orcid.org/0000-0001-9434-5218"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei He","raw_affiliation_strings":["SKLOIS, Institute of Information Engineering, CAS and School of Cyber Security, University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"SKLOIS, Institute of Information Engineering, CAS and School of Cyber Security, University of Chinese Academy of Sciences","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047799795","display_name":"Yueqiang Cheng","orcid":"https://orcid.org/0000-0002-6277-340X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yueqiang Cheng","raw_affiliation_strings":["NIO"],"affiliations":[{"raw_affiliation_string":"NIO","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390305","display_name":"Wenhao Wang","orcid":"https://orcid.org/0000-0001-7294-2724"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Wang","raw_affiliation_strings":["Institute of Information Engineering, CAS, China","Institute of Information Engineering, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"Institute of Information Engineering, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101863680","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-5783-2172"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["School of Computer Science and Engineering, Nan Jing University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nan Jing University of Science and Technology, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325519","display_name":"Minghua Wang","orcid":"https://orcid.org/0000-0002-2270-2076"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Minghua Wang","raw_affiliation_strings":["Ant Group"],"affiliations":[{"raw_affiliation_string":"Ant Group","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100456986","display_name":"Kang Li","orcid":"https://orcid.org/0000-0002-8136-9816"},"institutions":[{"id":"https://openalex.org/I98301712","display_name":"Baidu (China)","ror":"https://ror.org/03vs3wt56","country_code":"CN","type":"company","lineage":["https://openalex.org/I98301712"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Li","raw_affiliation_strings":["Baidu","Baidu Security,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Baidu","institution_ids":["https://openalex.org/I98301712"]},{"raw_affiliation_string":"Baidu Security,Beijing,China","institution_ids":["https://openalex.org/I98301712"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO","Data61, CSIRO, Sydney, NSW, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Australia","School of Software and Electrical Engineering; Swinburne University of Technology; Melbourne VIC Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"School of Software and Electrical Engineering; Swinburne University of Technology; Melbourne VIC Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5100410710"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":1.2237,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.83679424,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"16","issue":null,"first_page":"5167","last_page":"5181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dram","display_name":"Dram","score":0.9251887202262878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6549739837646484},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6074437499046326},{"id":"https://openalex.org/keywords/static-random-access-memory","display_name":"Static random-access memory","score":0.44341495633125305},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42011138796806335},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3857422471046448},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.20029327273368835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1824512481689453},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1277608573436737}],"concepts":[{"id":"https://openalex.org/C7366592","wikidata":"https://www.wikidata.org/wiki/Q1255620","display_name":"Dram","level":2,"score":0.9251887202262878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6549739837646484},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6074437499046326},{"id":"https://openalex.org/C68043766","wikidata":"https://www.wikidata.org/wiki/Q267416","display_name":"Static random-access memory","level":2,"score":0.44341495633125305},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42011138796806335},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3857422471046448},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.20029327273368835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1824512481689453},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1277608573436737}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2021.3124728","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3124728","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G419831423","display_name":null,"funder_award_id":"BK20200461","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G6203212911","display_name":null,"funder_award_id":"61802397","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7463024246","display_name":null,"funder_award_id":"2020YFB1805400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7884758391","display_name":null,"funder_award_id":"62002167","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1504046403","https://openalex.org/W1964316448","https://openalex.org/W1965522623","https://openalex.org/W2157116240","https://openalex.org/W2163563130","https://openalex.org/W2420049379","https://openalex.org/W2489077495","https://openalex.org/W2491829854","https://openalex.org/W2505343551","https://openalex.org/W2516668814","https://openalex.org/W2537014044","https://openalex.org/W2886541648","https://openalex.org/W2939057911","https://openalex.org/W2948811271","https://openalex.org/W2962654801","https://openalex.org/W2962726564","https://openalex.org/W2964118667","https://openalex.org/W2964923388","https://openalex.org/W2979333187","https://openalex.org/W3015367674","https://openalex.org/W3015685940","https://openalex.org/W3042829099","https://openalex.org/W3046609696","https://openalex.org/W3082761341","https://openalex.org/W3092001024","https://openalex.org/W3102933117","https://openalex.org/W3104711117","https://openalex.org/W4297740902","https://openalex.org/W6630265792","https://openalex.org/W6641191176","https://openalex.org/W6720892955","https://openalex.org/W6723169266","https://openalex.org/W6723175060","https://openalex.org/W6725368715","https://openalex.org/W6745261770","https://openalex.org/W6753951102","https://openalex.org/W6763559720","https://openalex.org/W6775611046","https://openalex.org/W6776033356"],"related_works":["https://openalex.org/W3120961607","https://openalex.org/W3148568549","https://openalex.org/W1648516568","https://openalex.org/W361036515","https://openalex.org/W4211178602","https://openalex.org/W2269474412","https://openalex.org/W4386903460","https://openalex.org/W2537599394","https://openalex.org/W2433923775","https://openalex.org/W2098987953"],"abstract_inverted_index":{"Rowhammer":[0],"is":[1,34,62,137],"a":[2,29,53,167],"destructive":[3],"software-induced":[4],"DRAM":[5,54,68,93,154,169],"fault,":[6],"which":[7],"an":[8,63],"attacker":[9],"can":[10],"leverage":[11],"to":[12,36,57,88,139],"break":[13],"system":[14,31],"security.":[15],"Both":[16],"individual":[17],"customers":[18],"and":[19,74,90,132,136,145,156,176],"enterprise":[20],"users":[21],"(e.g.,":[22],"cloud":[23],"providers)":[24],"might":[25],"refrain":[26],"from":[27],"using":[28],"computing":[30],"if":[32],"it":[33],"vulnerable":[35],"rowhammer":[37,58,78,119],"vulnerability.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42],"provide":[43],"the":[44,115],"first":[45],"end-to-end":[46],"tool,":[47],"coined":[48],"BitMine,":[49],"that":[50,151,163],"systematically":[51],"assesses":[52],"chip\u2019s":[55],"vulnerability":[56],"bit":[59,79,120,188],"flips.":[60,121],"BitMine":[61,102,122,146,181],"extension":[64],"of":[65,117],"DRAMDig.":[66],"As":[67],"address":[69,94,170],"mappings":[70,95],"are":[71],"proprietary":[72],"techniques":[73],"critical":[75],"in":[76,180,186],"inducing":[77],"flips,":[80],"DRAMDig,":[81,101],"our":[82],"prior":[83],"work,":[84],"leverages":[85],"domain":[86],"knowledge":[87],"efficiently":[89,165],"deterministically":[91],"reverse-engineer":[92],"on":[96,114],"Intel":[97,157],"machines.":[98],"By":[99],"incorporating":[100],"configures":[103],"three":[104],"key":[105],"parameters,":[106],"i.e.,":[107],"hammer":[108,110,127,130],"methods,":[109,128],"patterns,":[111,113],"data":[112,134],"effectiveness":[116,185],"finding":[118],"by":[123],"default":[124],"implements":[125],"13":[126],"4":[129],"patterns":[131,135],"16":[133],"extensible":[138],"support":[140],"more.":[141],"We":[142],"evaluate":[143],"DRAMDig":[144,164],"against":[147],"multiple":[148],"machine":[149,174,192],"models":[150],"combine":[152],"different":[153,191],"chips":[155],"microarchitectures.":[158],"Our":[159],"experiment":[160],"results":[161],"show":[162],"uncovers":[166],"deterministic":[168],"mapping":[171],"for":[172,190],"each":[173],"model,":[175],"every":[177],"implemented":[178],"parameter":[179],"has":[182],"its":[183],"distinct":[184],"triggering":[187],"flips":[189],"models.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
