![]() |
|
---|---|
Cost-Effective Hydra Method Monitors DRAM Memory in ComputersRow-Hammer Security Vulnerability Is a Fault in DRAM Modules in Computers |
8933 |
Improve the Reliability of Quantum Computers by Mitigating Measurements ErrorsIncreases measurement accuracy by 2–3x via exploitation of state-dependent bias and orchestrating dissimilar mistakes |
8207, 8208 |
Protecting Cache Memories from Eviction-Based AttacksAn algorithm to protect against eviction-based cache side channel attacks, while incurring negligible storage and performance loss, and without relying on any operating system support. |
7979 |
Zombie-Based Mitigation – Protecting Cache from Flush-Based Attack An algorithm that tolerates flush-based cache attacks without requiring rewrite of applications or profile information, and retaining page sharing. |
8008 |