{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:58:14Z","timestamp":1773511094492,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1717550, 1908406"],"award-info":[{"award-number":["1717550, 1908406"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.1145\/3466752.3480067","type":"proceedings-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T19:16:55Z","timestamp":1634498215000},"page":"1227-1240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Bonsai Merkle Forests: Efficiently Achieving Crash Consistency in Secure Persistent Memory"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Freij","sequence":"first","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"Huiyang","family":"Zhou","sequence":"additional","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"Yan","family":"Solihin","sequence":"additional","affiliation":[{"name":"University of Central Florida, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00019"},{"key":"e_1_3_2_1_2_1","volume-title":"Lazy Persistency: A High-Performing and Write-Efficient Software Persistency Technique. In 2018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA).","author":"Alshboul Mohamad","year":"2018","unstructured":"Mohamad Alshboul , James Tuck , and Yan Solihin . 2018 . Lazy Persistency: A High-Performing and Write-Efficient Software Persistency Technique. In 2018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA). Mohamad Alshboul, James Tuck, and Yan Solihin. 2018. Lazy Persistency: A High-Performing and Write-Efficient Software Persistency Technique. In 2018 ACM\/IEEE 45th Annual International Symposium on Computer Architecture (ISCA)."},{"key":"e_1_3_2_1_3_1","volume-title":"Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM","author":"Alwadi M.","year":"2020","unstructured":"M. Alwadi , K. Zubair , D. Mohaisen , and A. Awad . 2020 . Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM . IEEE Transactions on Dependable and Secure Computing ( 2020). M. Alwadi, K. Zubair, D. Mohaisen, and A. Awad. 2020. Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. IEEE Transactions on Dependable and Secure Computing (2020)."},{"key":"e_1_3_2_1_4_1","unstructured":"AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. (2020).  AMD. 2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. (2020)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322250"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Nathan Binkert Bradford Beckmann Gabriel Black Steven\u00a0K. Reinhardt Ali Saidi Arkaprava Basu Joel Hestness Derek\u00a0R. Hower Tushar Krishna Somayeh Sardashti Rathijit Sen Korey Sewell Muhammad Shoaib Nilay Vaish Mark\u00a0D. Hill and David\u00a0A. Wood. 2011. The Gem5 Simulator. SIGARCH Comput. Archit. News(2011).  Nathan Binkert Bradford Beckmann Gabriel Black Steven\u00a0K. Reinhardt Ali Saidi Arkaprava Basu Joel Hestness Derek\u00a0R. Hower Tushar Krishna Somayeh Sardashti Rathijit Sen Korey Sewell Muhammad Shoaib Nilay Vaish Mark\u00a0D. Hill and David\u00a0A. Wood. 2011. The Gem5 Simulator. SIGARCH Comput. Archit. News(2011).","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210377.3210381"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660224"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2009.5413140"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000086"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629589"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592814"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2003.1183547"},{"key":"e_1_3_2_1_16_1","volume-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium.","author":"Halderman J.","unstructured":"J. Halderman , S. Schoen , N. Heninger , W. Clarkson , W. Paul , J. Calandrino , A. Feldman , J. Appelbaum , and E. Felten . 2008 . Lest We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium. J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum, and E. Felten. 2008. Lest We Remember: Cold Boot Attacks on Encryption Keys. In USENIX Security Symposium."},{"key":"e_1_3_2_1_17_1","volume-title":"SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News(2006)","author":"Henning L.","year":"2006","unstructured":"John\u00a0 L. Henning . 2006 . SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News(2006) . John\u00a0L. Henning. 2006. SPEC CPU2006 Benchmark Descriptions. SIGARCH Comput. Archit. News(2006)."},{"key":"e_1_3_2_1_18_1","unstructured":"Intel. 2015. Intel and Micron Produce Breakthrough Memory Technology. (2015).  Intel. 2015. Intel and Micron Produce Breakthrough Memory Technology. (2015)."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel. 2021. Intel\u00ae Architecture Memory Encryption Technologies. (2021).  Intel. 2021. Intel\u00ae Architecture Memory Encryption Technologies. (2021)."},{"key":"e_1_3_2_1_20_1","unstructured":"David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. (2016).  David Kaplan Jeremy Powell and Tom Woller. 2016. AMD Memory Encryption. (2016)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"e_1_3_2_1_22_1","volume-title":"PoisonIvy: Safe Speculation for Secure Memory. In The 49th Annual IEEE\/ACM International Symposium on Microarchitecture.","author":"Lehman Tamara\u00a0Silbergleit","year":"2016","unstructured":"Tamara\u00a0Silbergleit Lehman , Andrew\u00a0 D. Hilton , and Benjamin\u00a0 C. Lee . 2016 . PoisonIvy: Safe Speculation for Secure Memory. In The 49th Annual IEEE\/ACM International Symposium on Microarchitecture. Tamara\u00a0Silbergleit Lehman, Andrew\u00a0D. Hilton, and Benjamin\u00a0C. Lee. 2016. PoisonIvy: Safe Speculation for Secure Memory. In The 49th Annual IEEE\/ACM International Symposium on Microarchitecture."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670529.2754969"},{"key":"e_1_3_2_1_24_1","volume-title":"Crash Consistency in Encrypted Non-volatile Main Memory Systems. 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA)","author":"Liu Sihang","year":"2018","unstructured":"Sihang Liu , Aasheesh Kolli , Jinglei Ren , and Samira\u00a0Manabi Khan . 2018 . Crash Consistency in Encrypted Non-volatile Main Memory Systems. 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA) (2018). Sihang Liu, Aasheesh Kolli, Jinglei Ren, and Samira\u00a0Manabi Khan. 2018. Crash Consistency in Encrypted Non-volatile Main Memory Systems. 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA) (2018)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322206"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037730"},{"key":"e_1_3_2_1_27_1","volume-title":"NVCool: When Non-Volatile Caches Meet Cold Boot Attacks. 2018 IEEE 36th International Conference on Computer Design (ICCD)","author":"Pan Xiang","year":"2018","unstructured":"Xiang Pan , Anys Bacha , Spencer Rudolph , Li Zhou , Yinqian Zhang , and Radu Teodorescu . 2018 . NVCool: When Non-Volatile Caches Meet Cold Boot Attacks. 2018 IEEE 36th International Conference on Computer Design (ICCD) (2018). Xiang Pan, Anys Bacha, Spencer Rudolph, Li Zhou, Yinqian Zhang, and Radu Teodorescu. 2018. NVCool: When Non-Volatile Caches Meet Cold Boot Attacks. 2018 IEEE 36th International Conference on Computer Design (ICCD) (2018)."},{"key":"e_1_3_2_1_28_1","volume-title":"Memory Persistency. In Proceeding of the 41st Annual International Symposium on Computer Architecuture (ISCA).","author":"Pelley Steven","year":"2014","unstructured":"Steven Pelley , Peter Chen , and Thomas Wenisch . 2014 . Memory Persistency. In Proceeding of the 41st Annual International Symposium on Computer Architecuture (ISCA). Steven Pelley, Peter Chen, and Thomas Wenisch. 2014. Memory Persistency. In Proceeding of the 41st Annual International Symposium on Computer Architecuture (ISCA)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062205"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1152154.1152170"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Brian Rogers Chenyu Yan Siddhartha Chhabra Milos Prvulovic and Yan Solihin. 2008. Single-Level Integrity and Confidentiality Protection for Distributed Shared Memory Multiprocessors. In in Proceedings of the 14th International Symposium on High Performance Computer Architecture (HPCA-14.  Brian Rogers Chenyu Yan Siddhartha Chhabra Milos Prvulovic and Yan Solihin. 2008. Single-Level Integrity and Confidentiality Protection for Distributed Shared Memory Multiprocessors. In in Proceedings of the 14th International Symposium on High Performance Computer Architecture (HPCA-14.","DOI":"10.1109\/HPCA.2008.4658636"},{"key":"e_1_3_2_1_33_1","unstructured":"Andy Rudoff. 2016. Deprecating the PCOMMIT Instruction. (2016).  Andy Rudoff. 2016. Deprecating the PCOMMIT Instruction. (2016)."},{"key":"e_1_3_2_1_34_1","volume-title":"Persistent Memory Programming Without All That Cache Flushing. In SDC","author":"Rudoof Andy","year":"2020","unstructured":"Andy Rudoof . [n. d.]. Persistent Memory Programming Without All That Cache Flushing. In SDC 2020 . Andy Rudoof. [n. d.]. Persistent Memory Programming Without All That Cache Flushing. In SDC 2020."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Steve Scargall. 2020. Programming Persistent Memory: A Comprehensive Guide for Developers.  Steve Scargall. 2020. Programming Persistent Memory: A Comprehensive Guide for Developers.","DOI":"10.1007\/978-1-4842-4932-1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124539"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080240"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956575"},{"key":"e_1_3_2_1_39_1","volume-title":"AEGIS: A Single-Chip Secure Processor","author":"Suh E.","year":"2007","unstructured":"G.\u00a0 E. Suh , C.\u00a0 W. O\u2019Donnell , and S. Devadas . 2007 . AEGIS: A Single-Chip Secure Processor . IEEE Design Test of Computers( 2007). G.\u00a0E. Suh, C.\u00a0W. O\u2019Donnell, and S. Devadas. 2007. AEGIS: A Single-Chip Secure Processor. IEEE Design Test of Computers(2007)."},{"key":"e_1_3_2_1_40_1","volume-title":"ACME: Advanced Counter Mode Encryption for Secure Non-Volatile Memories. In 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC).","author":"Swami S.","unstructured":"S. Swami and K. Mohanram . 2018 . ACME: Advanced Counter Mode Encryption for Secure Non-Volatile Memories. In 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC). S. Swami and K. Mohanram. 2018. ACME: Advanced Counter Mode Encryption for Secure Non-Volatile Memories. In 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC)."},{"key":"e_1_3_2_1_41_1","volume-title":"ARSENAL: Architecture for Secure Non-Volatile Memories. Computer Architecture Letters(2018).","author":"Swami Shivam","year":"2018","unstructured":"Shivam Swami and Kartik Mohanram . 2018 . ARSENAL: Architecture for Secure Non-Volatile Memories. Computer Architecture Letters(2018). Shivam Swami and Kartik Mohanram. 2018. ARSENAL: Architecture for Secure Non-Volatile Memories. Computer Architecture Letters(2018)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611765.2611774"},{"key":"e_1_3_2_1_43_1","volume-title":"Compact Leakage-Free Support for Integrity and Reliability. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA).","author":"Taassori Meysam","year":"2020","unstructured":"Meysam Taassori , Rajeev Balasubramonian , Siddhartha Chhabra , Alaa\u00a0 R. Alameldeen , Manjula Peddireddy , Rajat Agarwal , and Ryan Stutsman . 2020 . Compact Leakage-Free Support for Integrity and Reliability. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). Meysam Taassori, Rajeev Balasubramonian, Siddhartha Chhabra, Alaa\u00a0R. Alameldeen, Manjula Peddireddy, Rajat Agarwal, and Ryan Stutsman. 2020. Compact Leakage-Free Support for Integrity and Reliability. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_46_1","volume-title":"Automation Test in Europe Conference Exhibition (DATE).","author":"Vig S.","unstructured":"S. Vig , R. Juneja , and S. Lam . 2020. DISSECT: Dynamic Skew-and-Split Tree for Memory Authentication. In 2020 Design , Automation Test in Europe Conference Exhibition (DATE). S. Vig, R. Juneja, and S. Lam. 2020. DISSECT: Dynamic Skew-and-Split Tree for Memory Authentication. In 2020 Design, Automation Test in Europe Conference Exhibition (DATE)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.22"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/956417.956576"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00040"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322252"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358290"}],"event":{"name":"MICRO '21: 54th Annual IEEE\/ACM International Symposium on Microarchitecture","location":"Virtual Event Greece","acronym":"MICRO '21","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3466752.3480067","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480067","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:53Z","timestamp":1750195493000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":50,"alternative-id":["10.1145\/3466752.3480067","10.1145\/3466752"],"URL":"https:\/\/doi.org\/10.1145\/3466752.3480067","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}