Skip to main content

Showing 1–8 of 8 results for author: Canpolat, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.12947  [pdf, ps, other

    cs.AR cs.CR

    PuDHammer: Experimental Analysis of Read Disturbance Effects of Processing-using-DRAM in Real DRAM Chips

    Authors: Ismail Emir Yuksel, Akash Sood, Ataberk Olgun, Oğuzhan Canpolat, Haocong Luo, F. Nisa Bostancı, Mohammad Sadrosadati, A. Giray Yağlıkçı, Onur Mutlu

    Abstract: Processing-using-DRAM (PuD) is a promising paradigm for alleviating the data movement bottleneck using DRAM's massive internal parallelism and bandwidth to execute very wide operations. Performing a PuD operation involves activating multiple DRAM rows in quick succession or simultaneously, i.e., multiple-row activation. Multiple-row activation is fundamentally different from conventional memory ac… ▽ More

    Submitted 15 June, 2025; originally announced June 2025.

    Comments: Extended version of our publication at the 52nd International Symposium on Computer Architecture (ISCA-52), 2025

  2. arXiv:2506.10441  [pdf, ps, other

    cs.AR

    EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques

    Authors: Oğuzhan Canpolat, Ataberk Olgun, David Novo, Oğuz Ergin, Onur Mutlu

    Abstract: DRAM is a critical component of modern computing systems. Recent works propose numerous techniques (that we call DRAM techniques) to enhance DRAM-based computing systems' throughput, reliability, and computing capabilities (e.g., in-DRAM bulk data copy). Evaluating the system-wide benefits of DRAM techniques is challenging as they often require modifications across multiple layers of the computing… ▽ More

    Submitted 23 June, 2025; v1 submitted 12 June, 2025; originally announced June 2025.

    Comments: Extended version of our publication at DSN 2025

  3. arXiv:2503.17891  [pdf, other

    cs.CR cs.AR

    Understanding and Mitigating Side and Covert Channel Vulnerabilities Introduced by RowHammer Defenses

    Authors: F. Nisa Bostancı, Oğuzhan Canpolat, Ataberk Olgun, İsmail Emir Yüksel, Konstantinos Kanellopoulos, Mohammad Sadrosadati, A. Giray Yağlıkçı, Onur Mutlu

    Abstract: DRAM chips are vulnerable to read disturbance phenomena (e.g., RowHammer and RowPress), where repeatedly accessing or keeping open a DRAM row causes bitflips in nearby rows. Attackers leverage RowHammer bitflips in real systems to take over systems and leak data. Consequently, many prior works propose mitigations, including recent DDR specifications introducing new mitigations (e.g., PRAC and RFM)… ▽ More

    Submitted 22 April, 2025; v1 submitted 22 March, 2025; originally announced March 2025.

    Comments: This work was submitted to ISCA 2025 on November 22, 2024

  4. arXiv:2502.13075  [pdf, other

    cs.AR cs.CR

    Variable Read Disturbance: An Experimental Analysis of Temporal Variation in DRAM Read Disturbance

    Authors: Ataberk Olgun, F. Nisa Bostanci, Ismail Emir Yuksel, Oguzhan Canpolat, Haocong Luo, Geraldo F. Oliveira, A. Giray Yaglikci, Minesh Patel, Onur Mutlu

    Abstract: Modern DRAM chips are subject to read disturbance errors. State-of-the-art read disturbance mitigations rely on accurate and exhaustive characterization of the read disturbance threshold (RDT) (e.g., the number of aggressor row activations needed to induce the first RowHammer or RowPress bitflip) of every DRAM row (of which there are millions or billions in a modern system) to prevent read disturb… ▽ More

    Submitted 18 February, 2025; originally announced February 2025.

    Comments: Extended version of our publication at the 31st IEEE International Symposium on High-Performance Computer Architecture (HPCA-31), 2025

  5. arXiv:2502.12650  [pdf, other

    cs.CR cs.AR

    Chronus: Understanding and Securing the Cutting-Edge Industry Solutions to DRAM Read Disturbance

    Authors: Oğuzhan Canpolat, A. Giray Yağlıkçı, Geraldo F. Oliveira, Ataberk Olgun, Nisa Bostancı, İsmail Emir Yüksel, Haocong Luo, Oğuz Ergin, Onur Mutlu

    Abstract: We 1) present the first rigorous security, performance, energy, and cost analyses of the state-of-the-art on-DRAM-die read disturbance mitigation method, Per Row Activation Counting (PRAC) and 2) propose Chronus, a new mechanism that addresses PRAC's two major weaknesses. Our analysis shows that PRAC's system performance overhead on benign applications is non-negligible for modern DRAM chips and p… ▽ More

    Submitted 18 February, 2025; originally announced February 2025.

    Comments: To appear in HPCA'25. arXiv admin note: text overlap with arXiv:2406.19094

  6. arXiv:2502.11745  [pdf, other

    cs.AR cs.CR

    Understanding RowHammer Under Reduced Refresh Latency: Experimental Analysis of Real DRAM Chips and Implications on Future Solutions

    Authors: Yahya Can Tuğrul, A. Giray Yağlıkçı, İsmail Emir Yüksel, Ataberk Olgun, Oğuzhan Canpolat, Nisa Bostancı, Mohammad Sadrosadati, Oğuz Ergin, Onur Mutlu

    Abstract: RowHammer is a major read disturbance mechanism in DRAM where repeatedly accessing (hammering) a row of DRAM cells (DRAM row) induces bitflips in physically nearby DRAM rows (victim rows). To ensure robust DRAM operation, state-of-the-art mitigation mechanisms restore the charge in potential victim rows (i.e., they perform preventive refresh or charge restoration). With newer DRAM chip generations… ▽ More

    Submitted 17 February, 2025; originally announced February 2025.

    Comments: To appear in HPCA'25

  7. arXiv:2406.19094  [pdf, other

    cs.CR cs.AR

    Understanding the Security Benefits and Overheads of Emerging Industry Solutions to DRAM Read Disturbance

    Authors: Oğuzhan Canpolat, A. Giray Yağlıkçı, Geraldo F. Oliveira, Ataberk Olgun, Oğuz Ergin, Onur Mutlu

    Abstract: We present the first rigorous security, performance, energy, and cost analyses of the state-of-the-art on-DRAM-die read disturbance mitigation method, Per Row Activation Counting (PRAC), described in JEDEC DDR5 specification's April 2024 update. Unlike prior state-of-the-art that advises the memory controller to periodically issue refresh management (RFM) commands, which provides the DRAM chip wit… ▽ More

    Submitted 8 August, 2024; v1 submitted 27 June, 2024; originally announced June 2024.

    Comments: To appear in DRAMSec 2024

  8. arXiv:2404.13477  [pdf, other

    cs.CR cs.AR

    BreakHammer: Enhancing RowHammer Mitigations by Carefully Throttling Suspect Threads

    Authors: Oğuzhan Canpolat, A. Giray Yağlıkçı, Ataberk Olgun, İsmail Emir Yüksel, Yahya Can Tuğrul, Konstantinos Kanellopoulos, Oğuz Ergin, Onur Mutlu

    Abstract: RowHammer is a major read disturbance mechanism in DRAM where repeatedly accessing (hammering) a row of DRAM cells (DRAM row) induces bitflips in other physically nearby DRAM rows. RowHammer solutions perform preventive actions (e.g., refresh neighbor rows of the hammered row) that mitigate such bitflips to preserve memory isolation, a fundamental building block of security and privacy in modern c… ▽ More

    Submitted 4 October, 2024; v1 submitted 20 April, 2024; originally announced April 2024.

    Comments: To appear in MICRO'24