DRAM is the most prevalent memory technology used in laptops, mobile phones, workstations and servers. As such, its security is paramount, yet DRAM attacks remain as viable as ever despite many attempts to resolve its security problems: as an example, recent work has shown that modern DRAM remains vulnerable to Rowhammer, and in fact, newer chips are even more vulnerable than older ones. DRAM is also plagued by additional forms of attack including side-channel, Denial-of-Service (DoS) and cold-boot attacks.
DRAM security defenses are now at an impasse: the research community’s proposals do not take the practical constraints of DRAM devices into consideration while the industry is adopting obscure and ineffective remedies. There are huge ongoing efforts in industry to design safer and more reliable DRAM. Unfortunately, most of these efforts receive little input from the academic community. The goal of this workshop is to bridge these communities and to seek contributions from both academia and industry on the broad topic of DRAM security.
Here is the workshop schedule on June 17th and 18th depending on the timezone:
|Time CEST (17th)||Time EDT (17th)||Time KST (18th)||Topic|
|22:00 - 22:05||4:00 - 4:05 pm||5:00 - 5:05 am||Welcome by chairs|
|22:05 - 22:50||4:05 - 4:50 pm||5:05 - 5:50 am||Paper presentations|
|23:00 - 23:50||5:00 - 5:50 pm||6:00 - 6:50 am||Keynote|
|00:00 - 00:50||6:00 - 6:50 pm||7:00 - 7:50 am||Panel|
Vrije Universiteit Amsterdam
More information about the keynote can be found here.
University of Michigan
Taek Woon Kim
More information about the panelists can be found here.