{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:38Z","timestamp":1750308578880,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T00:00:00Z","timestamp":1506902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"LexisNexis Inc."},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1533767"],"award-info":[{"award-number":["CCF-1533767"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,2]]},"DOI":"10.1145\/3132402.3132439","type":"proceedings-article","created":{"date-parts":[[2017,10,12]],"date-time":"2017-10-12T12:51:09Z","timestamp":1507812669000},"page":"293-304","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Pagevault"],"prefix":"10.1145","author":[{"given":"Blaise-Pascal","family":"Tine","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sudhakar","family":"Yalamanchili","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_2_1","first-page":"4346","article-title":"The transport layer security (tls) protocol","author":"Dierks T.","year":"2006","unstructured":"T. Dierks and E. Rescorla . The transport layer security (tls) protocol . In IETF RFC 4346 , 2006 . T. Dierks and E. Rescorla. The transport layer security (tls) protocol. In IETF RFC 4346, 2006.","journal-title":"IETF RFC"},{"key":"e_1_3_2_1_3_1","volume-title":"Us secure hash algorithm 1 (sha1). Technical report","author":"Jones D. Eastlake","year":"2001","unstructured":"D. Eastlake 3rd and P. Jones . Us secure hash algorithm 1 (sha1). Technical report , 2001 . D. Eastlake 3rd and P. Jones. Us secure hash algorithm 1 (sha1). Technical report, 2001."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01004-0_1"},{"key":"e_1_3_2_1_5_1","first-page":"295","volume-title":"Proceedings of the 9th International Symposium on High-Performance Computer Architecture, HPCA '03","author":"Gassend B.","unstructured":"B. Gassend , G. E. Suh , D. Clarke , M. van Dijk , and S. Devadas . Caches and hash trees for efficient memory integrity verification . In Proceedings of the 9th International Symposium on High-Performance Computer Architecture, HPCA '03 , pages 295 -, Washington, DC, USA, 2003. IEEE Computer Society. B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and hash trees for efficient memory integrity verification. In Proceedings of the 9th International Symposium on High-Performance Computer Architecture, HPCA '03, pages 295-, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566673"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039525"},{"key":"e_1_3_2_1_9_1","volume-title":"No Starch Press","author":"Huang A. B.","year":"2003","unstructured":"A. B. Huang . Hacking the Xbox: An Introduction to Reverse Engineering . No Starch Press , San Francisco, CA, USA , 2003 . A. B. Huang. Hacking the Xbox: An Introduction to Reverse Engineering. No Starch Press, San Francisco, CA, USA, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791688.1791702"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.87"},{"key":"e_1_3_2_1_12_1","volume-title":"Hmac: Keyed-hashing for message authentication","author":"Krawczyk H.","year":"1997","unstructured":"H. Krawczyk , M. Bellare , and R. Canetti . Hmac: Keyed-hashing for message authentication , 1997 . H. Krawczyk, M. Bellare, and R. Canetti. Hmac: Keyed-hashing for message authentication, 1997."},{"key":"e_1_3_2_1_13_1","volume-title":"Comments to nist concerning aes modes of operation: Ctr-mode encryption","author":"Lipmaa H.","year":"2000","unstructured":"H. Lipmaa , D. Wagner , and P. Rogaway . Comments to nist concerning aes modes of operation: Ctr-mode encryption , 2000 . H. Lipmaa, D. Wagner, and P. Rogaway. Comments to nist concerning aes modes of operation: Ctr-mode encryption, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_27"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807591.2807626"},{"key":"e_1_3_2_1_17_1","volume-title":"Report on the development of the advanced encryption standard (aes. Technical report","author":"Nechvatal J.","year":"2000","unstructured":"J. Nechvatal , E. B. L. Bassham , M. Dworkin , J. Foti , and E. Roback . Report on the development of the advanced encryption standard (aes. Technical report , 2000 . J. Nechvatal, E. B. L. Bassham, M. Dworkin, J. Foti, and E. Roback. Report on the development of the advanced encryption standard (aes. Technical report, 2000."},{"key":"e_1_3_2_1_18_1","volume-title":"The secure hypertext transfer protocol","author":"Rescorla E.","year":"1999","unstructured":"E. Rescorla and A. Schiffman . The secure hypertext transfer protocol , 1999 . E. Rescorla and A. Schiffman. The secure hypertext transfer protocol, 1999."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.10"},{"key":"e_1_3_2_1_21_1","first-page":"339","volume-title":"Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36","author":"Suh G. E.","unstructured":"G. E. Suh , D. Clarke , B. Gassend , M. v. Dijk , and S. Devadas . Efficient memory integrity verification and encryption for secure processors . In Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36 , pages 339 -, Washington, DC, USA, 2003. IEEE Computer Society. G. E. Suh, D. Clarke, B. Gassend, M. v. Dijk, and S. Devadas. Efficient memory integrity verification and encryption for secure processors. In Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36, pages 339-, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611765.2611774"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2014.6844466"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456460"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.223990"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"},{"key":"e_1_3_2_1_27_1","first-page":"351","volume-title":"Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36","author":"Yang J.","unstructured":"J. Yang , Y. Zhang , and L. Gao . Fast secure processor for inhibiting software piracy and tampering . In Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36 , pages 351 -, Washington, DC, USA, 2003. IEEE Computer Society. J. Yang, Y. Zhang, and L. Gao. Fast secure processor for inhibiting software piracy and tampering. In Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture, MICRO 36, pages 351-, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2427795"}],"event":{"name":"MEMSYS 2017: The International Symposium on Memory Systems, 2017","acronym":"MEMSYS 2017","location":"Alexandria Virginia"},"container-title":["Proceedings of the International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132402.3132439","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132402.3132439","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132402.3132439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:56Z","timestamp":1750273496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132402.3132439"}},"subtitle":["securing off-chip memory using page-based authentication"],"short-title":[],"issued":{"date-parts":[[2017,10,2]]},"references-count":26,"alternative-id":["10.1145\/3132402.3132439","10.1145\/3132402"],"URL":"https:\/\/doi.org\/10.1145\/3132402.3132439","relation":{},"subject":[],"published":{"date-parts":[[2017,10,2]]},"assertion":[{"value":"2017-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}