{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:02:17Z","timestamp":1770332537827,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,11]],"date-time":"2022-06-11T00:00:00Z","timestamp":1654905600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,18]]},"DOI":"10.1145\/3470496.3527425","type":"proceedings-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T19:06:01Z","timestamp":1654023961000},"page":"188-203","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["PS-ORAM"],"prefix":"10.1145","author":[{"given":"Gang","family":"Liu","sequence":"first","affiliation":[{"name":"Hunan University, Changsha, Hunan, China"}]},{"given":"Kenli","family":"Li","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, Hunan, China"}]},{"given":"Zheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, Hunan, China"}]},{"given":"Rujia","family":"Wang","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.. In NDSS.","author":"Ahmad Adil","year":"2019","unstructured":"Adil Ahmad , Byunggill Joe , Yuan Xiao , Yinqian Zhang , Insik Shin , and Byoungyoung Lee . 2019 . OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.. In NDSS. Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee. 2019. OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.. In NDSS."},{"key":"e_1_3_2_1_2_1","volume-title":"Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee","author":"Ahmad Adil","year":"2018","unstructured":"Adil Ahmad , Kyungtae Kim , Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee . 2018 . OBLIVIATE : A Data Oblivious Filesystem for Intel SGX.. In NDSS. Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, and Byoungyoung Lee. 2018. OBLIVIATE: A Data Oblivious Filesystem for Intel SGX.. In NDSS."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00019"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3054780"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749441"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080230"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322250"},{"key":"e_1_3_2_1_8_1","first-page":"20","article-title":"Trusted platform module (tpm) based security on notebook pcs-white paper","volume":"1","author":"Bajikar Sundeep","year":"2002","unstructured":"Sundeep Bajikar . 2002 . Trusted platform module (tpm) based security on notebook pcs-white paper . Mobile Platforms Group Intel Corporation 1 (2002), 20 . Sundeep Bajikar. 2002. Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation 1 (2002), 20.","journal-title":"Mobile Platforms Group Intel Corporation"},{"key":"e_1_3_2_1_9_1","volume-title":"OpenCAPI: OVERVIEW & COMPARISON. In 13th ANNUAL WORKSHOP","author":"Benton Brad","year":"2017","unstructured":"Brad Benton . 2017 . CCIX, GEN-Z , OpenCAPI: OVERVIEW & COMPARISON. In 13th ANNUAL WORKSHOP 2017. Brad Benton. 2017. CCIX, GEN-Z, OpenCAPI: OVERVIEW & COMPARISON. In 13th ANNUAL WORKSHOP 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Nathan Binkert Bradford Beckmann Gabriel Black Steven K Reinhardt Ali Saidi Arkaprava Basu Joel Hestness Derek R Hower Tushar Krishna Somayeh Sardashti etal 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39 2 (2011) 1--7.  Nathan Binkert Bradford Beckmann Gabriel Black Steven K Reinhardt Ali Saidi Arkaprava Basu Joel Hestness Derek R Hower Tushar Krishna Somayeh Sardashti et al. 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39 2 (2011) 1--7.","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00012"},{"key":"e_1_3_2_1_12_1","volume-title":"Seeds of SEED: Efficient Access Pattern Obfuscation for Untrusted Hybrid Memory System. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 63--69","author":"Che Yuezhi","year":"2021","unstructured":"Yuezhi Che , Gang Liu , and Rujia Wang . 2021 . Seeds of SEED: Efficient Access Pattern Obfuscation for Untrusted Hybrid Memory System. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 63--69 . Yuezhi Che, Gang Liu, and Rujia Wang. 2021. Seeds of SEED: Efficient Access Pattern Obfuscation for Untrusted Hybrid Memory System. In 2021 International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 63--69."},{"key":"e_1_3_2_1_13_1","volume-title":"Multi-Range Supported Oblivious RAM for Efficient Block Data Retrieval. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 369--382","author":"Che Yuezhi","year":"2020","unstructured":"Yuezhi Che and Rujia Wang . 2020 . Multi-Range Supported Oblivious RAM for Efficient Block Data Retrieval. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 369--382 . Yuezhi Che and Rujia Wang. 2020. Multi-Range Supported Oblivious RAM for Efficient Block Data Retrieval. In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 369--382."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2020.3041484"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2013.6558440"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2012.6176872"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961295.1950380"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629589"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694353"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2015.58"},{"key":"e_1_3_2_1_21_1","volume-title":"Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent Memory. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 14--27","author":"Freij Alexander","year":"2020","unstructured":"Alexander Freij , Shougang Yuan , Huiyang Zhou , and Yan Solihin . 2020 . Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent Memory. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 14--27 . Alexander Freij, Shougang Yuan, Huiyang Zhou, and Yan Solihin. 2020. Persist Level Parallelism: Streamlining Integrity Tree Updates for Secure Persistent Memory. In 2020 53rd Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 14--27."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2731776"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378460"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465773"},{"key":"e_1_3_2_1_28_1","volume-title":"Update the Root of Integrity Tree in Secure Non-Volatile Memory Systems with Low Overhead. arXiv preprint arXiv:2103.03502","author":"Huang Jianming","year":"2021","unstructured":"Jianming Huang and Yu Hua . 2021. Update the Root of Integrity Tree in Secure Non-Volatile Memory Systems with Low Overhead. arXiv preprint arXiv:2103.03502 ( 2021 ). Jianming Huang and Yu Hua. 2021. Update the Root of Integrity Tree in Secure Non-Volatile Memory Systems with Low Overhead. arXiv preprint arXiv:2103.03502 (2021)."},{"key":"e_1_3_2_1_29_1","unstructured":"Intel. 2020. Intel Optane Technology: Revolutionizing Memory and Storage. Retrieved 2022 from https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/intel-optane-technology.html  Intel. 2020. Intel Optane Technology: Revolutionizing Memory and Storage. Retrieved 2022 from https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/intel-optane-technology.html"},{"key":"e_1_3_2_1_30_1","unstructured":"intel. 2021. eADR: New Opportunities for Persistent Memory Applications. Retrieved 2022 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/eadr-new-opportunities-for-persistent-memory-applications.html  intel. 2021. eADR: New Opportunities for Persistent Memory Applications. Retrieved 2022 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/eadr-new-opportunities-for-persistent-memory-applications.html"},{"key":"e_1_3_2_1_31_1","volume-title":"Ndss","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation .. In Ndss , Vol. 20 . Citeseer, 12. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.. In Ndss, Vol. 20. Citeseer, 12."},{"key":"e_1_3_2_1_32_1","volume-title":"Zixuan Wang, Yi Xu, Subramanya R Dulloor, et al.","author":"Izraelevitz Joseph","year":"2019","unstructured":"Joseph Izraelevitz , Jian Yang , Lu Zhang , Juno Kim , Xiao Liu , Amirsaman Memaripour , Yun Joon Soh , Zixuan Wang, Yi Xu, Subramanya R Dulloor, et al. 2019 . Basic performance measurements of the intel optane DC persistent memory module. arXiv preprint arXiv:1903.05714 (2019). Joseph Izraelevitz, Jian Yang, Lu Zhang, Juno Kim, Xiao Liu, Amirsaman Memaripour, Yun Joon Soh, Zixuan Wang, Yi Xu, Subramanya R Dulloor, et al. 2019. Basic performance measurements of the intel optane DC persistent memory module. arXiv preprint arXiv:1903.05714 (2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950327"},{"key":"e_1_3_2_1_34_1","first-page":"1","article-title":"Intel\u00ae software guard extensions: Epid provisioning and attestation services","volume":"1","author":"Johnson Simon","year":"2016","unstructured":"Simon Johnson , Vinnie Scarlata , Carlos Rozas , Ernie Brickell , and Frank Mckeen . 2016 . Intel\u00ae software guard extensions: Epid provisioning and attestation services . White Paper 1 (2016), 1 -- 10 . Simon Johnson, Vinnie Scarlata, Carlos Rozas, Ernie Brickell, and Frank Mckeen. 2016. Intel\u00ae software guard extensions: Epid provisioning and attestation services. White Paper 1 (2016), 1--10.","journal-title":"White Paper"},{"key":"e_1_3_2_1_35_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan , Jeremy Powell , and Tom Woller . 2016. AMD memory encryption. White paper ( 2016 ). David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2768405.2768406"},{"key":"e_1_3_2_1_37_1","volume-title":"29th {USENIX} Security Symposium ({USENIX} Security 20).","author":"Lee Dayeol","unstructured":"Dayeol Lee , Dongha Jung , Ian T Fang , Chia-Che Tsai , and Raluca Ada Popa . 2020. An off-chip attack on hardware enclaves via the memory bus . In 29th {USENIX} Security Symposium ({USENIX} Security 20). Dayeol Lee, Dongha Jung, Ian T Fang, Chia-Che Tsai, and Raluca Ada Popa. 2020. An off-chip attack on hardware enclaves via the memory bus. In 29th {USENIX} Security Symposium ({USENIX} Security 20)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357005"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2654822.2541957"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00035"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2014.6983056"},{"key":"e_1_3_2_1_43_1","volume-title":"11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). 433--448.","author":"Pillai Thanumalayan Sankaranarayana","unstructured":"Thanumalayan Sankaranarayana Pillai , Vijay Chidambaram , Ramnatthan Alagappan , Samer Al-Kiswany , Andrea C Arpaci-Dusseau , and Remzi H Arpaci-Dusseau . 2014. All file systems are not created equal: On the complexity of crafting crash-consistent applications . In 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). 433--448. Thanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Ramnatthan Alagappan, Samer Al-Kiswany, Andrea C Arpaci-Dusseau, and Remzi H Arpaci-Dusseau. 2014. All file systems are not created equal: On the complexity of crafting crash-consistent applications. In 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14). 433--448."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2402435"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2795621"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830802"},{"key":"e_1_3_2_1_48_1","volume-title":"USENIX Security Symposium. 415--430","author":"Ren Ling","year":"2015","unstructured":"Ling Ren , Christopher W Fletcher , Albert Kwon , Emil Stefanov , Elaine Shi , Marten Van Dijk , and Srinivas Devadas . 2015 . Constants Count: Practical Improvements to Oblivious RAM .. In USENIX Security Symposium. 415--430 . Ling Ren, Christopher W Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten Van Dijk, and Srinivas Devadas. 2015. Constants Count: Practical Improvements to Oblivious RAM.. In USENIX Security Symposium. 415--430."},{"key":"e_1_3_2_1_49_1","first-page":"205","article-title":"Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness","volume":"2014","author":"Ren Ling","year":"2014","unstructured":"Ling Ren , Christopher W Fletcher , Xiangyao Yu , Albert Kwon , Marten van Dijk , and Srinivas Devadas . 2014 . Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness . IACR Cryptol. ePrint Arch. 2014 (2014), 205 . Ling Ren, Christopher W Fletcher, Xiangyao Yu, Albert Kwon, Marten van Dijk, and Srinivas Devadas. 2014. Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness. IACR Cryptol. ePrint Arch. 2014 (2014), 205.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485971"},{"key":"e_1_3_2_1_51_1","unstructured":"Andy M Rudoff. 2016. Deprecating the pcommit instruction. Retrieved 2021 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/deprecate-pcommit-instruction.html  Andy M Rudoff. 2016. Deprecating the pcommit instruction. Retrieved 2021 from https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/blogs\/deprecate-pcommit-instruction.html"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.20"},{"key":"e_1_3_2_1_53_1","first-page":"549","article-title":"Zero-Trace: Oblivious Memory Primitives from Intel SGX","volume":"2017","author":"Sasy Sajin","year":"2017","unstructured":"Sajin Sasy , Sergey Gorbunov , and Christopher W Fletcher . 2017 . Zero-Trace: Oblivious Memory Primitives from Intel SGX . IACR Cryptology ePrint Archive 2017 (2017), 549 . Sajin Sasy, Sergey Gorbunov, and Christopher W Fletcher. 2017. Zero-Trace: Oblivious Memory Primitives from Intel SGX. IACR Cryptology ePrint Archive 2017 (2017), 549.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_54_1","volume-title":"Programming Persistent Memory: A Comprehensive Guide for Developers","author":"Scargall Steve","unstructured":"Steve Scargall . 2020. Programming Persistent Memory: A Comprehensive Guide for Developers . Springer Nature . Steve Scargall. 2020. Programming Persistent Memory: A Comprehensive Guide for Developers. Springer Nature."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208283"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540725"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872887.2750379"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898087"},{"key":"e_1_3_2_1_60_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID}","author":"Tople Shruti","year":"2019","unstructured":"Shruti Tople , Yaoqi Jia , and Prateek Saxena . 2019 . Pro-oram: Practical read-only oblivious {RAM} . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 197--211. Shruti Tople, Yaoqi Jia, and Prateek Saxena. 2019. Pro-oram: Practical read-only oblivious {RAM}. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019). 197--211."},{"key":"e_1_3_2_1_61_1","first-page":"61","article-title":"Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory","volume":"11","author":"Venkataraman Shivaram","year":"2011","unstructured":"Shivaram Venkataraman , Niraj Tolia , Parthasarathy Ranganathan , Roy H Campbell , 2011 . Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory .. In FAST , Vol. 11. 61 -- 75 . Shivaram Venkataraman, Niraj Tolia, Parthasarathy Ranganathan, Roy H Campbell, et al. 2011. Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory.. In FAST, Vol. 11. 61--75.","journal-title":"FAST"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961295.1950379"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.9"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00043"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967374"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317869"},{"key":"e_1_3_2_1_67_1","volume-title":"Khai Leong Yong, and Bingsheng He","author":"Yang Jun","year":"2015","unstructured":"Jun Yang , Qingsong Wei , Cheng Chen , Chundong Wang , Khai Leong Yong, and Bingsheng He . 2015 . NV-Tree: Reducing consistency cost for NVM-based single level systems. In 13th {USENIX} Conference on File and Storage Technologies ( {FAST} 15). 167--181. Jun Yang, Qingsong Wei, Cheng Chen, Chundong Wang, Khai Leong Yong, and Bingsheng He. 2015. NV-Tree: Reducing consistency cost for NVM-based single level systems. In 13th {USENIX} Conference on File and Storage Technologies ({FAST} 15). 167--181."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00040"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786763.2694387"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00082"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830787"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1037949.1024403"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358290"}],"event":{"name":"ISCA '22: The 49th Annual International Symposium on Computer Architecture","location":"New York New York","acronym":"ISCA '22","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS TCAA IEEE CS technical committee on architectural acoustics"]},"container-title":["Proceedings of the 49th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3470496.3527425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:53Z","timestamp":1750191533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3470496.3527425"}},"subtitle":["efficient crash consistency support for oblivious RAM on NVM"],"short-title":[],"issued":{"date-parts":[[2022,6,11]]},"references-count":73,"alternative-id":["10.1145\/3470496.3527425","10.1145\/3470496"],"URL":"https:\/\/doi.org\/10.1145\/3470496.3527425","relation":{},"subject":[],"published":{"date-parts":[[2022,6,11]]},"assertion":[{"value":"2022-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}