Data from: Machine Learning-based Rowhammer Mitigation

Public

  • This dataset consists of the memory access behavior of various applications including a mix of both normal applications and Rowhammer attacks, and associated code. The memory access data is generated using Gem5 v20.1.0.5. We use Gem5 to simulate a 4-core system with Linux OS in full-system mode. The data can be used for Rowhammer research or any other memory related research purpose.

Total Size
6 files (2.23 GB)
Data Citation
  • Joardar, B. K., Bletsch, T.K., Chakrabarty, K. (2022). Data from: Machine learning-based rowhammer mitigation. Duke Research Data Repository. https://doi.org/10.7924/r4hh6p604
DOI
  • 10.7924/r4hh6p604
ARK
  • ark:/87924/r4hh6p604
Type
Format
Related Materials
Contact
Title
  • Data from: Machine Learning-based Rowhammer Mitigation
This Dataset
Usage Stats