{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:30:54Z","timestamp":1737437454970,"version":"3.33.0"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF","award":["1717550","1908406"],"award-info":[{"award-number":["1717550","1908406"]}]},{"name":"AMD"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tdsc.2024.3389560","type":"journal-article","created":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T17:33:27Z","timestamp":1713288807000},"page":"101-113","source":"Crossref","is-referenced-by-count":0,"title":["Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2840-1394","authenticated-orcid":false,"given":"Shougang","family":"Yuan","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3987-463X","authenticated-orcid":false,"given":"Amro","family":"Awad","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0722","authenticated-orcid":false,"given":"Huiyang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ispass51385.2021.00017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/hpca.2018.00046"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/hpca51647.2021.00011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2016.2585549"},{"key":"ref6","first-page":"45","article-title":"Lest we remember: Cold boot attacks on encryption keys","volume-title":"Proc. 17th USENIX Secur. Symp.","author":"Halderman"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.23919\/DATE.2017.7927156","article-title":"The rowhammer problem and other issues we may face as memory becomes denser","author":"Mutlu","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2016.124"},{"article-title":"AMD memory encryption","year":"2016","author":"Kaplan","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3447818.3460374"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/hpca53966.2022.00024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3524059.3532361"},{"article-title":"Parboil: A revised benchmark suite for scientific and commercial throughput computing","year":"2009","author":"Stratton","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306797"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19595-2_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2013.6704684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.21236\/ADA419599"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"ref19","first-page":"681","article-title":"Graviton: Trusted execution environments on GPUs","volume-title":"Proc. 13th USENIX Symp. Operating Syst. Des. Implementation","author":"Volos"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446081"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243831"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196042"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1498690.1498691"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00015"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071100"},{"article-title":"Fastlz. USA","year":"2019","author":"Hidayat","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00073"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00047"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919648"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/10843954\/10502313-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10843954\/10502313.pdf?arnumber=10502313","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T03:57:26Z","timestamp":1737431846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10502313\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3389560","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}