{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:08Z","timestamp":1750220708431,"version":"3.41.0"},"reference-count":72,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T00:00:00Z","timestamp":1589760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research and Development Plan in Key field of Guangdong Province","award":["2018B010109002"],"award-info":[{"award-number":["2018B010109002"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61832011"],"award-info":[{"award-number":["61832011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research & Development Program of China","award":["2018YFB1003301"],"award-info":[{"award-number":["2018YFB1003301"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>Data encryption and authentication are essential for secure non-volatile memory (NVM). However, the introduced security metadata needs to be atomically written back to NVM along with data, so as to provide crash consistency, which unfortunately incurs high overhead. To support fine-grained data protection and fast recovery for a secure NVM system without compromising the performance, we propose ShieldNVM. It first proposes an epoch-based mechanism to aggressively cache the security metadata in the metadata cache while retaining the consistency of them in NVM. Deferred spreading is also introduced to reduce the calculating overhead for data authentication. Leveraging the ability of data hash message authentication codes, we can always recover the consistent but old security metadata to its newest version. By recording a limited number of dirty addresses of the security metadata, ShieldNVM achieves fast recovering the secure NVM system after crashes. Compared to Osiris, a state-of-the-art secure NVM, ShieldNVM reduces system runtime by 39.1% and hash message authentication code computation overhead by 80.5% on average over NVM workloads. When system crashes happen, ShieldNVM\u2019s recovery time is orders of magnitude faster than Osiris. In addition, ShieldNVM also recovers faster than AGIT, which is the Osiris-based state-of-the-art mechanism addressing the recovery time of the secure NVM system. Once the recovery process fails, instead of dropping all data due to malicious attacks, ShieldNVM is able to detect and locate the area of the tampered data with the help of the tracked addresses.<\/jats:p>","DOI":"10.1145\/3381835","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T10:09:28Z","timestamp":1589882968000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["ShieldNVM"],"prefix":"10.1145","volume":"16","author":[{"given":"Fan","family":"Yang","sequence":"first","affiliation":[{"name":"Tsinghua University"}]},{"given":"Youmin","family":"Chen","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Haiyu","family":"Mao","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Youyou","family":"Lu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]}],"member":"320","published-online":{"date-parts":[[2020,5,18]]},"reference":[{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_1_1","unstructured":"Intel. 2015 . Intel and Micron Produce Breakthrough Memory Technology: 3D XPoint . Retrieved April 12, 2020 from https:\/\/newsroom.intel.com\/news-releases\/intel-and-micron-produce-breakthrough-memory-technology\/. Intel. 2015. Intel and Micron Produce Breakthrough Memory Technology: 3D XPoint. Retrieved April 12, 2020 from https:\/\/newsroom.intel.com\/news-releases\/intel-and-micron-produce-breakthrough-memory-technology\/."},{"key":"e_1_2_1_2_1","unstructured":"Intel. 2018. Intel Architecture Instruction Set Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/ files\/managed\/c5\/15\/architecture-instruction-set-extensions-programming- reference.pdf.  Intel. 2018. Intel Architecture Instruction Set Extensions Programming Reference. https:\/\/software.intel.com\/sites\/default\/ files\/managed\/c5\/15\/architecture-instruction-set-extensions-programming- reference.pdf."},{"volume-title":"Retrieved","year":"2019","key":"e_1_2_1_3_1","unstructured":"Pmem.io. 2019 . Persistent Memory Development Kit . Retrieved April 12, 2020 from https:\/\/pmem.io\/pmdk\/. Pmem.io. 2019. Persistent Memory Development Kit. Retrieved April 12, 2020 from https:\/\/pmem.io\/pmdk\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00044"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872377"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322250"},{"key":"e_1_2_1_7_1","volume-title":"Retrieved","author":"Eduardo","year":"2017","unstructured":"Eduardo B. 2017 . Enhancing High-Performance Computing with Persistent Memory Technology . Retrieved April 12, 2020 from https:\/\/software.intel.com\/en-us\/articles\/enhancing-high-performance-computing-with-persistent-memory-technology. Eduardo B. 2017. Enhancing High-Performance Computing with Persistent Memory Technology. Retrieved April 12, 2020 from https:\/\/software.intel.com\/en-us\/articles\/enhancing-high-performance-computing-with-persistent-memory-technology."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317810"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3204454","article-title":"HiNFS: A persistent memory file system with both buffering and direct-access","volume":"14","author":"Chen Youmin","year":"2018","unstructured":"Youmin Chen , Jiwu Shu , Jiaxin Ou , and Youyou Lu . 2018 . HiNFS: A persistent memory file system with both buffering and direct-access . ACM Transactions on Storage 14 , 1 (April 2018), Article 4, 30 pages. DOI:https:\/\/doi.org\/10.1145\/3204454 10.1145\/3204454 Youmin Chen, Jiwu Shu, Jiaxin Ou, and Youyou Lu. 2018. HiNFS: A persistent memory file system with both buffering and direct-access. ACM Transactions on Storage 14, 1 (April 2018), Article 4, 30 pages. DOI:https:\/\/doi.org\/10.1145\/3204454","journal-title":"ACM Transactions on Storage"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 2011 38th Annual International Symposium on Computer Architecture (ISCA\u201911)","author":"Chhabra S.","year":"2000","unstructured":"S. Chhabra and Y. Solihin . 2011. i-NVMM: A secure non-volatile main memory system with incremental encryption . In Proceedings of the 2011 38th Annual International Symposium on Computer Architecture (ISCA\u201911) . 177--188. DOI:https:\/\/doi.org\/10.1145\/ 2000 064.2000086 10.1145\/2000064.2000086 S. Chhabra and Y. Solihin. 2011. i-NVMM: A secure non-volatile main memory system with incremental encryption. In Proceedings of the 2011 38th Annual International Symposium on Computer Architecture (ISCA\u201911). 177--188. DOI:https:\/\/doi.org\/10.1145\/2000064.2000086"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950380"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629589"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592814"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 9th International Symposium on High-Performance Computer Architecture (HPCA\u201903)","author":"Gassend B.","year":"2003","unstructured":"B. Gassend , G. E. Suh , D. Clarke , M. van Dijk , and S. Devadas . 2003. Caches and hash trees for efficient memory integrity verification . In Proceedings of the 9th International Symposium on High-Performance Computer Architecture (HPCA\u201903) . 295--306. DOI:https:\/\/doi.org\/10.1109\/HPCA. 2003 .1183547 10.1109\/HPCA.2003.1183547 B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. 2003. Caches and hash trees for efficient memory integrity verification. In Proceedings of the 9th International Symposium on High-Performance Computer Architecture (HPCA\u201903). 295--306. DOI:https:\/\/doi.org\/10.1109\/HPCA.2003.1183547"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI\u201918)","author":"Gogte Vaibhav","year":"1923","unstructured":"Vaibhav Gogte , Stephan Diestelhorst , William Wang , Satish Narayanasamy , Peter M. Chen , and Thomas F. Wenisch . 2018. Persistency for synchronization-free regions . In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI\u201918) . ACM, New York, NY, 46--61. DOI:https:\/\/doi.org\/10.1145\/3 1923 66.3192367 10.1145\/3192366.3192367 Vaibhav Gogte, Stephan Diestelhorst, William Wang, Satish Narayanasamy, Peter M. Chen, and Thomas F. Wenisch. 2018. Persistency for synchronization-free regions. In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI\u201918). ACM, New York, NY, 46--61. DOI:https:\/\/doi.org\/10.1145\/3192366.3192367"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 2019 USENIX Annual Technical Conference (USENIX ATC\u201919)","author":"Gu Jinyu","year":"2019","unstructured":"Jinyu Gu , Qianqian Yu , Xiayang Wang , Zhaoguo Wang , Binyu Zang , Haibing Guan , and Haibo Chen . 2019 . Pisces: A scalable and efficient persistent transactional memory . In Proceedings of the 2019 USENIX Annual Technical Conference (USENIX ATC\u201919) . 913--928. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/gu Jinyu Gu, Qianqian Yu, Xiayang Wang, Zhaoguo Wang, Binyu Zang, Haibing Guan, and Haibo Chen. 2019. Pisces: A scalable and efficient persistent transactional memory. In Proceedings of the 2019 USENIX Annual Technical Conference (USENIX ATC\u201919). 913--928. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/gu"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358321"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 12th European Conference on Computer Systems (EuroSys\u201917)","author":"Ching-Hsiang Hsu Terry","year":"2017","unstructured":"Terry Ching-Hsiang Hsu , Helge Br\u00fcgner , Indrajit Roy , Kimberly Keeton , and Patrick Eugster . 2017 . NVthreads: Practical persistence for multi-threaded applications . In Proceedings of the 12th European Conference on Computer Systems (EuroSys\u201917) . ACM, New York, NY, 468--482. DOI:https:\/\/doi.org\/10.1145\/3064176.3064204 10.1145\/3064176.3064204 Terry Ching-Hsiang Hsu, Helge Br\u00fcgner, Indrajit Roy, Kimberly Keeton, and Patrick Eugster. 2017. NVthreads: Practical persistence for multi-threaded applications. In Proceedings of the 12th European Conference on Computer Systems (EuroSys\u201917). ACM, New York, NY, 468--482. DOI:https:\/\/doi.org\/10.1145\/3064176.3064204"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917)","author":"Hu Qingda","year":"2017","unstructured":"Qingda Hu , Jinglei Ren , Anirudh Badam , Jiwu Shu , and Thomas Moscibroda . 2017 . Log-structured non-volatile main memory . In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917) . 703--717. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/hu. Qingda Hu, Jinglei Ren, Anirudh Badam, Jiwu Shu, and Thomas Moscibroda. 2017. Log-structured non-volatile main memory. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917). 703--717. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/hu."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918)","author":"Hwang Deukyeon","year":"2018","unstructured":"Deukyeon Hwang , Wook-Hee Kim , Youjip Won , and Beomseok Nam . 2018 . Endurable transient inconsistency in byte-addressable persistent B+-tree . In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918) . 187--200. https:\/\/www.usenix.org\/conference\/fast18\/presentation\/hwang. Deukyeon Hwang, Wook-Hee Kim, Youjip Won, and Beomseok Nam. 2018. Endurable transient inconsistency in byte-addressable persistent B+-tree. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918). 187--200. https:\/\/www.usenix.org\/conference\/fast18\/presentation\/hwang."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872410"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830805"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00045"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.50"},{"volume-title":"Proceedings of the 44th Annual International Symposium on Computer Architecture (ISCA\u201917)","author":"Kolli Aasheesh","key":"e_1_2_1_26_1","unstructured":"Aasheesh Kolli , Vaibhav Gogte , Ali Saidi , Stephan Diestelhorst , Peter M. Chen , Satish Narayanasamy , and Thomas F. Wenisch . 2017. Language-level persistency . In Proceedings of the 44th Annual International Symposium on Computer Architecture (ISCA\u201917) . ACM, New York, NY, 481--493. DOI:https:\/\/doi.org\/10.1145\/3079856.3080229 10.1145\/3079856.3080229 Aasheesh Kolli, Vaibhav Gogte, Ali Saidi, Stephan Diestelhorst, Peter M. Chen, Satish Narayanasamy, and Thomas F. Wenisch. 2017. Language-level persistency. In Proceedings of the 44th Annual International Symposium on Computer Architecture (ISCA\u201917). ACM, New York, NY, 481--493. DOI:https:\/\/doi.org\/10.1145\/3079856.3080229"},{"volume-title":"Proceedings of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201916)","author":"Kolli Aasheesh","key":"e_1_2_1_27_1","unstructured":"Aasheesh Kolli , Steven Pelley , Ali Saidi , Peter M. Chen , and Thomas F. Wenisch . 2016. High-performance transactions for persistent memories . In Proceedings of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201916) . ACM, New York, NY, 399--411. DOI:https:\/\/doi.org\/10.1145\/2872362.2872381 10.1145\/2872362.2872381 Aasheesh Kolli, Steven Pelley, Ali Saidi, Peter M. Chen, and Thomas F. Wenisch. 2016. High-performance transactions for persistent memories. In Proceedings of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201916). ACM, New York, NY, 399--411. DOI:https:\/\/doi.org\/10.1145\/2872362.2872381"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-49)","author":"Kolli Aasheesh","year":"1956","unstructured":"Aasheesh Kolli , Jeff Rosen , Stephan Diestelhorst , Ali Saidi , Steven Pelley , Sihang Liu , Peter M. Chen , and Thomas F. Wenisch . 2016. Delegated persist ordering . In Proceedings of the 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-49) . IEEE, Los Alamitos, CA, Article 58, 13 pages. http:\/\/dl.acm.org\/citation.cfm?id&equals;3 1956 38.3195709. Aasheesh Kolli, Jeff Rosen, Stephan Diestelhorst, Ali Saidi, Steven Pelley, Sihang Liu, Peter M. Chen, and Thomas F. Wenisch. 2016. Delegated persist ordering. In Proceedings of the 49th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-49). IEEE, Los Alamitos, CA, Article 58, 13 pages. http:\/\/dl.acm.org\/citation.cfm?id&equals;3195638.3195709."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557176"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555758"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2538218"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783741"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037714"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00035"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322206"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208274"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 2014 IEEE 32nd International Conference on Computer Design (ICCD\u201914)","author":"Lu Y.","year":"2014","unstructured":"Y. Lu , J. Shu , L. Sun , and O. Mutlu . 2014. Loose-ordering consistency for persistent memory . In Proceedings of the 2014 IEEE 32nd International Conference on Computer Design (ICCD\u201914) . 216--223. DOI:https:\/\/doi.org\/10.1109\/ICCD. 2014 .6974684 10.1109\/ICCD.2014.6974684 Y. Lu, J. Shu, L. Sun, and O. Mutlu. 2014. Loose-ordering consistency for persistent memory. In Proceedings of the 2014 IEEE 32nd International Conference on Computer Design (ICCD\u201914). 216--223. DOI:https:\/\/doi.org\/10.1109\/ICCD.2014.6974684"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201917)","author":"Mao H.","year":"2017","unstructured":"H. Mao , X. Zhang , G. Sun , and J. Shu . 2017. Protect non-volatile memory from wear-out attack based on timing difference of row buffer hit\/miss . In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201917) . 1623--1626. DOI:https:\/\/doi.org\/10.23919\/DATE. 2017 .7927251 10.23919\/DATE.2017.7927251 H. Mao, X. Zhang, G. Sun, and J. Shu. 2017. Protect non-volatile memory from wear-out attack based on timing difference of row buffer hit\/miss. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201917). 1623--1626. DOI:https:\/\/doi.org\/10.23919\/DATE.2017.7927251"},{"key":"e_1_2_1_39_1","volume-title":"Retrieved","author":"Mulnix David","year":"2015","unstructured":"David Mulnix . 2015 . Intel Xeon Processor D Product Family Technical Overview . Retrieved April 12, 2020 from https:\/\/software.intel.com\/en-us\/articles\/intel-xeon-processor-d-product-family-technical-overview#_Toc419802876y. David Mulnix. 2015. Intel Xeon Processor D Product Family Technical Overview. Retrieved April 12, 2020 from https:\/\/software.intel.com\/en-us\/articles\/intel-xeon-processor-d-product-family-technical-overview#_Toc419802876y."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037730"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3323298.3323302"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151018"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277332.3277354"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915251"},{"volume-title":"Proceedings of the 41st Annual International Symposium on Computer Architecuture (ISCA\u201914)","author":"Pelley Steven","key":"e_1_2_1_45_1","unstructured":"Steven Pelley , Peter M. Chen , and Thomas F. Wenisch . 2014. Memory persistency . In Proceedings of the 41st Annual International Symposium on Computer Architecuture (ISCA\u201914) . IEEE, Los Alamitos, CA, 265--276. http:\/\/dl.acm.org\/citation.cfm?id&equals;2665671.2665712. Steven Pelley, Peter M. Chen, and Thomas F. Wenisch. 2014. Memory persistency. In Proceedings of the 41st Annual International Symposium on Computer Architecuture (ISCA\u201914). IEEE, Los Alamitos, CA, 265--276. http:\/\/dl.acm.org\/citation.cfm?id&equals;2665671.2665712."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062205"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00028"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830802"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.16"},{"key":"e_1_2_1_50_1","volume-title":"Retrieved","author":"Rudoff A. M.","year":"2016","unstructured":"A. M. Rudoff . 2016 . Deprecating the PCOMMIT Instruction . Retrieved April 12, 2020 from https:\/\/software.intel.com\/en-us\/blogs\/2016\/09\/12\/deprecate-pcommit-instruction. A. M. Rudoff. 2016. Deprecating the PCOMMIT Instruction. Retrieved April 12, 2020 from https:\/\/software.intel.com\/en-us\/blogs\/2016\/09\/12\/deprecate-pcommit-instruction."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00041"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00046"},{"volume-title":"Proceedings of the 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-50)","author":"Shin S.","key":"e_1_2_1_53_1","unstructured":"S. Shin , S. K. Tirukkovalluri , J. Tuck , and Y. Solihin . 2017. Proteus: A flexible and fast software supported hardware logging approach for NVM . In Proceedings of the 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-50) . 178--190. S. Shin, S. K. Tirukkovalluri, J. Tuck, and Y. Solihin. 2017. Proteus: A flexible and fast software supported hardware logging approach for NVM. In Proceedings of the 2017 50th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-50). 178--190."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2018.00012"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-36)","author":"Suh G. E.","year":"2003","unstructured":"G. E. Suh , D. Clarke , B. Gasend , M. van Dijk , and S. Devadas . 2003. Efficient memory integrity verification and encryption for secure processors . In Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-36) . 339--350. DOI:https:\/\/doi.org\/10.1109\/MICRO. 2003 .1253207 10.1109\/MICRO.2003.1253207 G. E. Suh, D. Clarke, B. Gasend, M. van Dijk, and S. Devadas. 2003. Efficient memory integrity verification and encryption for secure processors. In Proceedings of the 36th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-36). 339--350. DOI:https:\/\/doi.org\/10.1109\/MICRO.2003.1253207"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201917)","author":"Swami S.","year":"2017","unstructured":"S. Swami and K. Mohanram . 2017. COVERT: Counter OVErflow ReducTion for efficient encryption of non-volatlle memories . In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201917) . 906--909. DOI:https:\/\/doi.org\/10.23919\/DATE. 2017 .7927117 10.23919\/DATE.2017.7927117 S. Swami and K. Mohanram. 2017. COVERT: Counter OVErflow ReducTion for efficient encryption of non-volatlle memories. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE\u201917). 906--909. DOI:https:\/\/doi.org\/10.23919\/DATE.2017.7927117"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3195983"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2863281"},{"volume-title":"Proceedings of the 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC\u201916)","author":"Swami S.","key":"e_1_2_1_59_1","unstructured":"S. Swami , J. Rakshit , and K. Mohanram . 2016. SECRET: Smartly EnCRypted energy efficienT non-volatile memories . In Proceedings of the 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC\u201916) . 1--6. DOI:https:\/\/doi.org\/10.1145\/2897937.2898087 10.1145\/2897937.2898087 S. Swami, J. Rakshit, and K. Mohanram. 2016. SECRET: Smartly EnCRypted energy efficienT non-volatile memories. In Proceedings of the 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC\u201916). 1--6. DOI:https:\/\/doi.org\/10.1145\/2897937.2898087"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196123"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201911)","author":"Volos Haris","year":"1950","unstructured":"Haris Volos , Andres Jaan Tack , and Michael M. Swift . 2011. Mnemosyne: Lightweight persistent memory . In Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201911) . ACM, New York, NY, 91--104. DOI:https:\/\/doi.org\/10.1145\/ 1950 365.1950379 10.1145\/1950365.1950379 Haris Volos, Andres Jaan Tack, and Michael M. Swift. 2011. Mnemosyne: Lightweight persistent memory. In Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201911). ACM, New York, NY, 91--104. DOI:https:\/\/doi.org\/10.1145\/1950365.1950379"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063436"},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916)","author":"Xu Jian","year":"2016","unstructured":"Jian Xu and Steven Swanson . 2016 . NOVA: A log-structured file system for hybrid volatile\/non-volatile main memories . In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916) . 323--338. https:\/\/www.usenix.org\/conference\/fast16\/technical-sessions\/presentation\/xu. Jian Xu and Steven Swanson. 2016. NOVA: A log-structured file system for hybrid volatile\/non-volatile main memories. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916). 323--338. https:\/\/www.usenix.org\/conference\/fast16\/technical-sessions\/presentation\/xu."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317869"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00040"},{"volume-title":"Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201915)","author":"Young Vinson","key":"e_1_2_1_68_1","unstructured":"Vinson Young , Prashant J. Nair , and Moinuddin K. Qureshi . 2015. DEUCE: Write-efficient encryption for non-volatile memories . In Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201915) . ACM, New York, NY, 33--44. DOI:https:\/\/doi.org\/10.1145\/2694344.2694387 10.1145\/2694344.2694387 Vinson Young, Prashant J. Nair, and Moinuddin K. Qureshi. 2015. DEUCE: Write-efficient encryption for non-volatile memories. In Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201915). ACM, New York, NY, 33--44. DOI:https:\/\/doi.org\/10.1145\/2694344.2694387"},{"volume-title":"Proceedings of the 2013 46th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-46)","author":"Zhao J.","key":"e_1_2_1_69_1","unstructured":"J. Zhao , S. Li , D. H. Yoon , Y. Xie , and N. P. Jouppi . 2013. Kiln: Closing the performance gap between systems with and without persistence support . In Proceedings of the 2013 46th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-46) . 421--432. J. Zhao, S. Li, D. H. Yoon, Y. Xie, and N. P. Jouppi. 2013. Kiln: Closing the performance gap between systems with and without persistence support. In Proceedings of the 2013 46th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO-46). 421--432."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322252"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918)","author":"Zuo Pengfei","year":"2018","unstructured":"Pengfei Zuo , Yu Hua , and Jie Wu . 2018 . Write-optimized and high-performance hashing index scheme for persistent memory . In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918) . 461--476. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/zuo. Pengfei Zuo, Yu Hua, and Jie Wu. 2018. Write-optimized and high-performance hashing index scheme for persistent memory. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918). 461--476. https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/zuo."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358290"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381835","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:07Z","timestamp":1750199587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381835"}},"subtitle":["An Efficient and Fast Recoverable System for Secure Non-Volatile Memory"],"short-title":[],"issued":{"date-parts":[[2020,5,18]]},"references-count":72,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3381835"],"URL":"https:\/\/doi.org\/10.1145\/3381835","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"type":"print","value":"1553-3077"},{"type":"electronic","value":"1553-3093"}],"subject":[],"published":{"date-parts":[[2020,5,18]]},"assertion":[{"value":"2019-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}