Security

START: Scalable Tracking for Any Rowhammer Threshold

Randomized Line-to-Row Mapping for Low-Overhead Rowhammer Mitigations

PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks

AQUA: Scalable Rowhammer Mitigation by Quarantining Aggressor Rows at Runtime

DABANGG: A Case for Noise Resilient Flush-Based Cache Attacks

Flush-based attack optimizations

Identified and analyzed possible optimizations in flush-based cache attacks to improve their resolution and accuracy.

CLKscrew Attack

Explained the power of smart power management feature exploitation to weaken system confidentiality and integrity

ZombieLoad Attack

Explained the domain of transiet-execution attacks, its types and the sub-class of microarchitectural data-sampling attacks, which ZombieLoad forms a part of