{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T11:31:31Z","timestamp":1763724691006,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133074","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T13:29:36Z","timestamp":1685021376000},"page":"191-202","source":"Crossref","is-referenced-by-count":6,"title":["OMT: A Run-time Adaptive Architectural Framework for Bonsai Merkle Tree-Based Secure Authentication with Embedded Heterogeneous Memory"],"prefix":"10.1109","author":[{"given":"Rakin Muhammad","family":"Shadab","sequence":"first","affiliation":[{"name":"University of Central Florida,Department of ECE"}]},{"given":"Yu","family":"Zou","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of ECE"}]},{"given":"Sanjay","family":"Gandham","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of ECE"}]},{"given":"Mingjie","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Central Florida,Department of ECE"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.124"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056797"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2017.45"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00038"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317869"},{"key":"ref14","article-title":"Benchmarking gnn-based recommender systems on intel optane persistent memory","author":"hu","year":"2022","journal-title":"arXiv preprint arXiv 2207 11918"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1150019.1136502"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3419100"},{"key":"ref30","article-title":"Optimizing hybrid access virtual memory system using scm\/dram unified memory management unit","author":"shirota","year":"2019","journal-title":"In The International Conference for High Performance Computing Networking Storage and Analysis (SC19) poster"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480067"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8342089"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT47144.2019.9001747"},{"key":"ref32","article-title":"Intel optane dcpmm and serverless computing","author":"uyar","year":"2021","journal-title":"arXiv preprint arXiv 2109 11399"},{"journal-title":"Phoenix Towards ultra-low overhead recoverable and persistently secure nvm","year":"2020","author":"alwadi","key":"ref2"},{"journal-title":"Intel Kills Optane Memory Business Pays $559 Million Inventory Write-Off","year":"2022","author":"alcorn","key":"ref1"},{"key":"ref17","article-title":"Basic performance measurements of the intel optane dc persistent memory module","author":"izraelevitz","year":"2019","journal-title":"arXiv preprint arXiv 1903 05810"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00040"},{"journal-title":"Intel optane persistent memory","year":"2022","key":"ref16"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TC.2005.80","article-title":"Improving memory encryption performance in secure processors","volume":"54","author":"yang","year":"2005","journal-title":"IEEE Transactions on Computers"},{"journal-title":"Pond Cxl-based memory pooling systems for cloud platforms","year":"2023","author":"li","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3538643.3539745"},{"key":"ref24","first-page":"304","article-title":"System evaluation of the intel optane byte-addressable nvm","author":"ivy","year":"2019","journal-title":"In Proceedings of the International Symposium on Memory Systems"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322252"},{"key":"ref23","article-title":"Beebs: Open benchmarks for energy measurements on embedded platforms","author":"pallister","year":"2013","journal-title":"arXiv preprint arXiv 1308 5174"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3492735"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/1152154.1152170","article-title":"Efficient Data Protection for Distributed Shared Memory Multiprocessors","author":"brian rogers","year":"2006","journal-title":"In International Conference on Parallel Architectures and Compilation Techniques (PACT)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00043"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2020.2987303"},{"key":"ref42","first-page":"715","article-title":"Dspstone: A dsp-oriented benchmarking methodology. Proc","author":"zivojnovic","year":"1994","journal-title":"Signal Processing Applications & Technology Dallas TX"},{"key":"ref41","article-title":"Hnvm: Hybrid nvm enabled datacenter design and optimization","author":"zhou","year":"2017","journal-title":"Microsoft Research TR"},{"key":"ref22","article-title":"Memory bandwidth and machine balance in current high performance computers","volume":"2","author":"d mccalpin","year":"1995","journal-title":"IEEE Computer Society Technical Committee on Computer Architecture (TCCA) Newsletter"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00066"},{"key":"ref21","first-page":"1","article-title":"Overview of amazon web services","volume":"105","author":"mathew","year":"2014","journal-title":"Amazon Whitepaper"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HOST49136.2021.9702283"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HOTI55740.2022.00017"},{"key":"ref27","article-title":"Hmt: A hardware-centric hybrid bonsai merkle tree algorithm for high-performance authentication","author":"muhammad shadab","year":"2022","journal-title":"arXiv preprint arXiv 2204 08976"},{"key":"ref29","article-title":"Last week intel killed optane","author":"sharwood","year":"2022","journal-title":"competing tech keeps coming"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339242"},{"key":"ref7","article-title":"Intel sgx explained","author":"costan","year":"2016","journal-title":"Cryptology ePrint Archive"},{"key":"ref9","first-page":"1","article-title":"Hardware mechanisms for memory authentication: A survey of existing techniques and engines","author":"elbaz","year":"2009","journal-title":"Transactions on Computational Science IV"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00114"},{"key":"ref3","first-page":"263","volume":"51","author":"awad","year":"2016","journal-title":"Silent shredder Zero-cost shredding for secure non-volatile main memory controllers ACM SIGPLAN Notices"},{"key":"ref6","first-page":"234","article-title":"On the performance and use of a space-efficient merkle tree traversal algorithm in real-time applica-tions for wireless and sensor networks","author":"berbecaru","year":"2008","journal-title":"2008 IEEE International Conference on Wireless and Mobile Computing Networking and Com-munications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322250"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2786763.2694387"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2023,5,1]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133074.pdf?arnumber=10133074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T13:45:47Z","timestamp":1687182347000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133074\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133074","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}