1. An Chen. A Review of Emerging Non-Volatile Memory (NVM) Technologies and Applications. Solid-State Electronics (2016).
2. Binkert, N., Beckmann, B., Black, G., et al. The Gem5 Simulator. SIGARCH (2011).
3. Boneh D. DeMillo R. A. and Lipton R. J. On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptol. (2001).
4. Chiappetta, M., Savas, E., and Yilmaz, C. Real Time Detection of Cache-based Side-Channel Attacks Using Hardware Performance Counters. Applied Soft Computing 49 (2016), 1162--1174.
5. Cojocar, L., Kim, J., Patel, M., et al. Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers. In IEEE Symposium on Security and Privacy (SP) (May 2020), IEEE.