Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
The New Costs of Physical Memory Fragmentation
- Alexander Halbuer,
- Illia Ostapyshyn,
- Lukas Steiner,
- Lars Wrenger,
- Matthias Jung,
- Christian Dietrich,
- Daniel Lohmann
DIMES '24: Proceedings of the 2nd Workshop on Disruptive Memory SystemsPages 33–40https://doi.org/10.1145/3698783.3699378External fragmentation is becoming a serious problem again after paging temporarily solved it with its one-size-fits-all 4 KiB approach. The increasing adoption of mixed base, huge, and giant page sizes, DRAM energy-saving techniques, and memory ...
- research-articleSeptember 2024
Towards Application Centric Carbon Emission Management
ACM SIGEnergy Energy Informatics Review (SIGENERGY-EIR), Volume 4, Issue 3Pages 80–86https://doi.org/10.1145/3698365.3698378Carbon emissions are due to application execution on a target system (operational emissions) and the production, transportation, and disposal of the system itself (embodied emissions). This paper investigates the impacts of different resource ...
- research-articleSeptember 2024
Sectored DRAM: A Practical Energy-Efficient and High-Performance Fine-Grained DRAM Architecture
- Ataberk Olgun,
- F. Nisa Bostanci,
- Geraldo Francisco de Oliveira Junior,
- Yahya Can Tugrul,
- Rahul Bera,
- Abdullah Giray Yaglikci,
- Hasan Hassan,
- Oguz Ergin,
- Onur Mutlu
ACM Transactions on Architecture and Code Optimization (TACO), Volume 21, Issue 3Article No.: 60, Pages 1–29https://doi.org/10.1145/3673653Modern computing systems access data in main memory at coarse granularity (e.g., at 512-bit cache block granularity). Coarse-grained access leads to wasted energy because the system does not use all individually accessed small portions (e.g., words, each ...
- research-articleAugust 2024
Cache Line Pinning for Mitigating Row Hammer Attack
ICPP '24: Proceedings of the 53rd International Conference on Parallel ProcessingPages 802–811https://doi.org/10.1145/3673038.3673114RowHammer attack is a serious security threat to DRAM-based memory that causes bit flips in nearby rows when a DRAM row is accessed frequently. Many mitigation strategies are proposed against the RowHammer attack, and a few of the mitigation strategies ...
- tutorialJuly 2024
An Introduction to the Compute Express Link (CXL) Interconnect
ACM Computing Surveys (CSUR), Volume 56, Issue 11Article No.: 290, Pages 1–37https://doi.org/10.1145/3669900The Compute Express Link (CXL) is an open industry-standard interconnect between processors and devices such as accelerators, memory buffers, smart network interfaces, persistent memory, and solid-state drives. CXL offers coherency and memory semantics ...
-
- research-articleJuly 2024
SoK: Rowhammer on Commodity Operating Systems
- Zhi Zhang,
- Decheng Chen,
- Jiahao Qi,
- Yueqiang Cheng,
- Shijie Jiang,
- Yiyang Lin,
- Yansong Gao,
- Surya Nepal,
- Yi Zou,
- Jiliang Zhang,
- Yang Xiang
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 436–452https://doi.org/10.1145/3634737.3656998Rowhammer has drawn much attention from both academia and industry in the past years as rowhammer exploitation poses severe consequences to system security. Since the first comprehensive study of rowhammer in 2014, a number of rowhammer attacks have been ...
- research-articleNovember 2024
Reducing DRAM Latency via In-situ Temperature- and Process-Variation-Aware Timing Detection and Adaption
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 67, Pages 1–6https://doi.org/10.1145/3649329.3656228Long DRAM access latency has a significant impact on modern system performance. However, the improvement of DRAM access latency is limited, as the DRAM vendors reserve considerable timing margins against seldom worst-case conditions. To mitigate such ...
- research-articleNovember 2024
HAIL-DIMM: Host Access Interleaved with Near-Data Processing on DIMM-based Memory System
DAC '24: Proceedings of the 61st ACM/IEEE Design Automation ConferenceArticle No.: 164, Pages 1–6https://doi.org/10.1145/3649329.3655933Near-data processing (NDP), a solution to reduce data movement overhead between host and memory, should not interfere with host access to ensure system fairness. We propose a cost-effective and energy-efficient LRDIMM-based NDP architecture (HAIL-DIMM) ...
- research-articleJune 2024
A DRAM-based Near-Memory Architecture for Accelerated and Energy-Efficient Execution of Transformers
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024Pages 57–62https://doi.org/10.1145/3649476.3658732Transformers-based language models have achieved remarkable accuracy in various NLP tasks, employing self-attention mechanisms primarily based on matrix multiplication. However, their significant size leads to data movement issues, causing latency and ...
- research-articleJune 2024
FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments
- Sihan Yu,
- Jingjing Fu,
- Chenxu Jiang,
- Chunchih Lin,
- Zhenkai Zhang,
- Long Cheng,
- Ming Li,
- Xiaonan Zhang,
- Linke Guo
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 372–384https://doi.org/10.1145/3643832.3661870Memory Electromagnetic Radiation (EMR) allows attackers to manipulate the DRAM of infiltrated systems to leak sensitive secret information. Although most of the existing works have demonstrated its feasibility, practical concerns, such as the ideal ...
- research-articleJune 2024
CLAY: CXL-based Scalable NDP Architecture Accelerating Embedding Layers
ICS '24: Proceedings of the 38th ACM International Conference on SupercomputingPages 338–351https://doi.org/10.1145/3650200.3656595An embedding layer is one of the most critical building blocks of deep neural networks, especially for recommender systems and graph neural networks. The embedding layer dominates a large portion of the total execution time due to its large memory ...
- research-articleApril 2024
TAROT: A CXL SmartNIC-Based Defense Against Multi-bit Errors by Row-Hammer Attacks
- Chihun Song,
- Michael Jaemin Kim,
- Tianchen Wang,
- Houxiang Ji,
- Jinghan Huang,
- Ipoom Jeong,
- Jaehyun Park,
- Hwayong Nam,
- Minbok Wi,
- Jung Ho Ahn,
- Nam Sung Kim
ASPLOS '24: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3Pages 981–998https://doi.org/10.1145/3620666.3651325Row Hammer (RH) has been demonstrated as a security vulnerability in modern systems. Although commodity CPUs can handle RH-induced single-bit errors in DRAM through ECC, RH can still give rise to multi-bit uncorrectable errors (UEs) and crash the ...
- research-articleApril 2024
AttAcc! Unleashing the Power of PIM for Batched Transformer-based Generative Model Inference
ASPLOS '24: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2Pages 103–119https://doi.org/10.1145/3620665.3640422The Transformer-based generative model (TbGM), comprising summarization (Sum) and generation (Gen) stages, has demonstrated unprecedented generative performance across a wide range of applications. However, it also demands immense amounts of compute and ...
- research-articleApril 2024
Rubix: Reducing the Overhead of Secure Rowhammer Mitigations via Randomized Line-to-Row Mapping
ASPLOS '24: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2Pages 1014–1028https://doi.org/10.1145/3620665.3640404Modern systems mitigate Rowhammer using victim refresh, which refreshes neighbours of an aggressor row when it encounters a specified number of activations. Unfortunately, complex attack patterns like Half-Double break victim-refresh, rendering current ...
- research-articleMay 2024
Approximate data mapping in refresh-free DRAM for energy-efficient computing in modern mobile systems
Computer Communications (COMS), Volume 216, Issue CPages 151–158https://doi.org/10.1016/j.comcom.2023.12.037AbstractIn the context of modern mobile and embedded communication systems, the increasing storage density of dynamic random access memory (DRAM) poses significant challenges in energy management, with DRAM refresh emerging as a major factor in energy ...
- research-articleNovember 2023
A formal framework to design and prove trustworthy memory controllers
Real-Time Systems (RETS), Volume 59, Issue 4Pages 664–704https://doi.org/10.1007/s11241-023-09411-3AbstractIn order to prove conformance to memory standards and bound memory access latency, recently proposed real-time DRAM controllers rely on paper and pencil proofs, which can be troubling: they are difficult to read and review, they are often shown ...
- research-articleNovember 2023
Unity ECC: Unified Memory Protection Against Bit and Chip Errors
SC '23: Proceedings of the International Conference for High Performance Computing, Networking, Storage and AnalysisArticle No.: 48, Pages 1–16https://doi.org/10.1145/3581784.3607081DRAM vendors utilize On-Die Error Correction Codes (OD-ECC) to correct random bit errors internally. Meanwhile, system companies utilize Rank-Level ECC (RL-ECC) to protect data against chip errors. Separate protection increases the redundancy ratio to ...
- review-articleNovember 2023
A survey on techniques for improving Phase Change Memory (PCM) lifetime
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 144, Issue Chttps://doi.org/10.1016/j.sysarc.2023.103008AbstractPCMs are Non-Volatile Memories (NVMs) that store data using phase-change semiconductors, such as silicon-chalcogenide glass. In addition to increased integration density, PCMs have high durability and data transfer rates and consume less power ...
- research-articleDecember 2023
How to Kill the Second Bird with One ECC: The Pursuit of Row Hammer Resilient DRAM
- Michael Jaemin Kim,
- Minbok Wi,
- Jaehyun Park,
- Seoyoung Ko,
- Jaeyoung Choi,
- Hwayoung Nam,
- Nam Sung Kim,
- Jung Ho Ahn,
- Eojin Lee
MICRO '23: Proceedings of the 56th Annual IEEE/ACM International Symposium on MicroarchitecturePages 986–1001https://doi.org/10.1145/3613424.3623777Error-correcting code (ECC) has been widely used in DRAM-based memory systems to address the exacerbating random errors following the fabrication process scaling. However, ECCs including the strong form of Chipkill have not been so effective against Row ...