{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T12:49:31Z","timestamp":1751374171570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,18]]},"DOI":"10.1145\/3466752.3480118","type":"proceedings-article","created":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T19:12:05Z","timestamp":1634497925000},"page":"1241-1253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory"],"prefix":"10.1145","author":[{"given":"Xijing","family":"Han","sequence":"first","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"James","family":"Tuck","sequence":"additional","affiliation":[{"name":"North Carolina State University, United States of America"}]},{"given":"Amro","family":"Awad","sequence":"additional","affiliation":[{"name":"North Carolina State University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Mohammad Alshboul James Tuck and Yan Solihin. 2018. Lazy Persistency: a High-Performing and Write-Efficient Software Persistency Technique. In 2018 ACM\/IEEE 45TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA). 439-51. https:\/\/doi.org\/10.1109\/ISCA.2018.00044 10.1109\/ISCA.2018.00044","key":"#cr-split#-e_1_3_2_1_1_1.1","DOI":"10.1109\/ISCA.2018.00044"},{"doi-asserted-by":"crossref","unstructured":"Mohammad Alshboul James Tuck and Yan Solihin. 2018. Lazy Persistency: a High-Performing and Write-Efficient Software Persistency Technique. In 2018 ACM\/IEEE 45TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA). 439-51. https:\/\/doi.org\/10.1109\/ISCA.2018.00044","key":"#cr-split#-e_1_3_2_1_1_1.2","DOI":"10.1109\/ISCA.2018.00044"},{"key":"e_1_3_2_1_2_1","volume-title":"Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM","author":"Alwadi Mazen","year":"2020","unstructured":"Mazen Alwadi , Kazi Zubair , David Mohaisen , and Amro Awad . 2020 . Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM . IEEE Transactions on Dependable and Secure Computing ( 2020), 1\u20131. https:\/\/doi.org\/10.1109\/TDSC.2020.3020085 10.1109\/TDSC.2020.3020085 Mazen Alwadi, Kazi Zubair, David Mohaisen, and Amro Awad. 2020. Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. IEEE Transactions on Dependable and Secure Computing (2020), 1\u20131. https:\/\/doi.org\/10.1109\/TDSC.2020.3020085"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/2872362.2872377"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ISVLSI.2019.00114"},{"volume-title":"2017 ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). 107\u2013119","author":"Awad A.","unstructured":"A. Awad , Y. Wang , D. Shands , and Y. Solihin . 2017. ObfusMem: A low-overhead access obfuscation for trusted memories . In 2017 ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). 107\u2013119 . https:\/\/doi.org\/10.1145\/3079856.3080230 10.1145\/3079856.3080230 A. Awad, Y. Wang, D. Shands, and Y. Solihin. 2017. ObfusMem: A low-overhead access obfuscation for trusted memories. In 2017 ACM\/IEEE 44th Annual International Symposium on Computer Architecture (ISCA). 107\u2013119. https:\/\/doi.org\/10.1145\/3079856.3080230","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/3307650.3322250"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2024716.2024718"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/ISCA.2006.22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2024723.2000086"},{"key":"e_1_3_2_1_10_1","volume-title":"Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent Memory. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 14\u201327","author":"Freij Alexander","year":"2020","unstructured":"Alexander Freij , Shougang Yuan , Huiyang Zhou , and Yan Solihin . 2020 . Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent Memory. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 14\u201327 . Alexander Freij, Shougang Yuan, Huiyang Zhou, and Yan Solihin. 2020. Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent Memory. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 14\u201327."},{"volume-title":"Build Persistent Memory Applications with Reliability Availability and Serviceability. [Online","year":"2021","unstructured":"Intel. 2020. Build Persistent Memory Applications with Reliability Availability and Serviceability. [Online ; accessed 7- March - 2021 ]. Intel. 2020. Build Persistent Memory Applications with Reliability Availability and Serviceability. [Online; accessed 7-March-2021].","key":"e_1_3_2_1_11_1"},{"volume-title":"The Challenge of Keeping Up with Data. [Online","year":"2021","unstructured":"Intel. 2020. The Challenge of Keeping Up with Data. [Online ; accessed 7- March - 2021 ]. Intel. 2020. The Challenge of Keeping Up with Data. [Online; accessed 7-March-2021].","key":"e_1_3_2_1_12_1"},{"volume-title":"Deprecating the PCOMMIT Instruction. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/deprecate-pcommit-instruction.html [Online","year":"2021","unstructured":"Intel. 2020. Deprecating the PCOMMIT Instruction. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/deprecate-pcommit-instruction.html [Online ; accessed 7- March - 2021 ]. Intel. 2020. Deprecating the PCOMMIT Instruction. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/deprecate-pcommit-instruction.html [Online; accessed 7-March-2021].","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Crash Consistency in Encrypted Non-volatile Main Memory Systems. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 310\u2013323","author":"Liu S.","year":"2018","unstructured":"S. Liu , A. Kolli , J. Ren , and S. Khan . 2018 . Crash Consistency in Encrypted Non-volatile Main Memory Systems. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 310\u2013323 . https:\/\/doi.org\/10.1109\/HPCA. 2018 .00035 10.1109\/HPCA.2018.00035 S. Liu, A. Kolli, J. Ren, and S. Khan. 2018. Crash Consistency in Encrypted Non-volatile Main Memory Systems. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 310\u2013323. https:\/\/doi.org\/10.1109\/HPCA.2018.00035"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3307650.3322206"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/3093337.3037730"},{"key":"e_1_3_2_1_17_1","volume-title":"Persistent Memory Programming. \u201dhttps:\/\/pmem.io\/pmdk\/\u201d. [Online","author":"PMDK.","year":"2021","unstructured":"PMDK. 2020. Persistent Memory Programming. \u201dhttps:\/\/pmem.io\/pmdk\/\u201d. [Online ; accessed 7- March - 2021 ]. PMDK. 2020. Persistent Memory Programming. \u201dhttps:\/\/pmem.io\/pmdk\/\u201d. [Online; accessed 7-March-2021]."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/MICRO.2007.16"},{"key":"e_1_3_2_1_19_1","volume-title":"Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 416\u2013427","author":"Saileshwar G.","year":"2018","unstructured":"G. Saileshwar , P.\u00a0 J. Nair , P. Ramrakhyani , W. Elsasser , J.\u00a0 A. Joao , and M.\u00a0 K. Qureshi . 2018 . Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 416\u2013427 . https:\/\/doi.org\/10.1109\/MICRO.2018.00041 10.1109\/MICRO.2018.00041 G. Saileshwar, P.\u00a0J. Nair, P. Ramrakhyani, W. Elsasser, J.\u00a0A. Joao, and M.\u00a0K. Qureshi. 2018. Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories. In 2018 51st Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 416\u2013427. https:\/\/doi.org\/10.1109\/MICRO.2018.00041"},{"key":"e_1_3_2_1_20_1","volume-title":"SYNERGY: Rethinking Secure-Memory Design for Error-Correcting Memories. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 454\u2013465","author":"Saileshwar G.","year":"2018","unstructured":"G. Saileshwar , P.\u00a0 J. Nair , P. Ramrakhyani , W. Elsasser , and M.\u00a0 K. Qureshi . 2018 . SYNERGY: Rethinking Secure-Memory Design for Error-Correcting Memories. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 454\u2013465 . https:\/\/doi.org\/10.1109\/HPCA.2018.00046 10.1109\/HPCA.2018.00046 G. Saileshwar, P.\u00a0J. Nair, P. Ramrakhyani, W. Elsasser, and M.\u00a0K. Qureshi. 2018. SYNERGY: Rethinking Secure-Memory Design for Error-Correcting Memories. In 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA). 454\u2013465. https:\/\/doi.org\/10.1109\/HPCA.2018.00046"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3079856.3080240"},{"key":"e_1_3_2_1_22_1","first-page":"146","article-title":"A High Speed Architecture for Galois\/Counter Mode of Operation (GCM)","volume":"2005","author":"Yang Bo","year":"2005","unstructured":"Bo Yang , Sambit Mishra , and R. Karri . 2005 . A High Speed Architecture for Galois\/Counter Mode of Operation (GCM) . IACR Cryptol. ePrint Arch. 2005 (2005), 146 . Bo Yang, Sambit Mishra, and R. Karri. 2005. A High Speed Architecture for Galois\/Counter Mode of Operation (GCM). IACR Cryptol. ePrint Arch. 2005 (2005), 146.","journal-title":"IACR Cryptol. ePrint Arch."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/MICRO.2018.00040"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2775054.2694387"},{"key":"e_1_3_2_1_25_1","volume-title":"Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). 597\u2013609","author":"Zhou J.","year":"2020","unstructured":"J. Zhou , A. Awad , and J. Wang . 2020 . Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). 597\u2013609 . https:\/\/doi.org\/10.1109\/ISCA45697. 2020 .00056 10.1109\/ISCA45697.2020.00056 J. Zhou, A. Awad, and J. Wang. 2020. Lelantus: Fine-Granularity Copy-On-Write Operations for Secure Non-Volatile Memories. In 2020 ACM\/IEEE 47th Annual International Symposium on Computer Architecture (ISCA). 597\u2013609. https:\/\/doi.org\/10.1109\/ISCA45697.2020.00056"},{"volume-title":"Anubis: Ultra-Low Overhead and Recovery Time for Secure Non-Volatile Memories. In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). 157\u2013168","author":"Zubair A.","unstructured":"K.\u00a0 A. Zubair and A. Awad . 2019 . Anubis: Ultra-Low Overhead and Recovery Time for Secure Non-Volatile Memories. In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). 157\u2013168 . K.\u00a0A. Zubair and A. Awad. 2019. Anubis: Ultra-Low Overhead and Recovery Time for Secure Non-Volatile Memories. In 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). 157\u2013168.","key":"e_1_3_2_1_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/MICRO.2018.00043"}],"event":{"sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"acronym":"MICRO '21","name":"MICRO '21: 54th Annual IEEE\/ACM International Symposium on Microarchitecture","location":"Virtual Event Greece"},"container-title":["MICRO-54: 54th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3466752.3480118","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480118","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466752.3480118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:57Z","timestamp":1750191537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466752.3480118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":28,"alternative-id":["10.1145\/3466752.3480118","10.1145\/3466752"],"URL":"https:\/\/doi.org\/10.1145\/3466752.3480118","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}