{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:46:05Z","timestamp":1772725565212,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61832020,61821003"],"award-info":[{"award-number":["61832020,61821003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2018YFB1003305"],"award-info":[{"award-number":["2018YFB1003305"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,9]]},"DOI":"10.1145\/3472456.3472483","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T18:39:57Z","timestamp":1633459197000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Crash-Consistency-Aware Encryption for Non-Volatile Memories"],"prefix":"10.1145","author":[{"given":"Mengya","family":"Lei","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Fang","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Fan","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]},{"given":"Xueliang","family":"Wei","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Lazy persistency: A high-performing and write-efficient software persistency technique","author":"Alshboul Mohammad","unstructured":"Mohammad Alshboul , James Tuck , and Yan Solihin . 2018. Lazy persistency: A high-performing and write-efficient software persistency technique . In ISCA. ACM\/IEEE , 439\u2013451. Mohammad Alshboul, James Tuck, and Yan Solihin. 2018. Lazy persistency: A high-performing and write-efficient software persistency technique. In ISCA. ACM\/IEEE, 439\u2013451."},{"key":"e_1_3_2_1_2_1","volume-title":"Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM","author":"Alwadi Mazen","year":"2020","unstructured":"Mazen Alwadi , Kazi Zubair , David Mohaisen , and Amro Awad . 2020 . Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM . IEEE Transactions on Dependable and Secure Computing ( 2020), 1\u20131. Mazen Alwadi, Kazi Zubair, David Mohaisen, and Amro Awad. 2020. Phoenix: Towards Ultra-Low Overhead, Recoverable, and Persistently Secure NVM. IEEE Transactions on Dependable and Secure Computing (2020), 1\u20131."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463585.2463589"},{"key":"e_1_3_2_1_4_1","volume-title":"Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories","author":"Awad Amro","unstructured":"Amro Awad , Laurent Njilla , and Mao Ye. 2019. Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories . In ISCA. ACM\/IEEE , 104\u2013115. Amro Awad, Laurent Njilla, and Mao Ye. 2019. Triad-NVM: Persistent-Security for Integrity-Protected and Encrypted Non-Volatile Memories. In ISCA. ACM\/IEEE, 104\u2013115."},{"key":"e_1_3_2_1_5_1","volume-title":"The gem5 simulator. ACM SIGARCH computer architecture news 39, 2","author":"Binkert Nathan","year":"2011","unstructured":"Nathan Binkert , Bradford Beckmann , Gabriel Black , Steven\u00a0 K Reinhardt , Ali Saidi , Arkaprava Basu , Joel Hestness , Derek\u00a0 R. Hower , Tushar Krishna , Somayeh Sardashti , 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39, 2 ( 2011 ), 1\u20137. Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven\u00a0K Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek\u00a0R. Hower, Tushar Krishna, Somayeh Sardashti, 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39, 2 (2011), 1\u20137."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0124"},{"key":"e_1_3_2_1_7_1","volume-title":"Intel architecture instruction set extensions programming reference","author":"Cooperation Intel","year":"2016","unstructured":"Intel Cooperation . 2016. Intel architecture instruction set extensions programming reference . Intel Corp., Mountain View, CA, USA, Tech. Rep ( 2016 ), 319433\u2013030. Intel Cooperation. 2016. Intel architecture instruction set extensions programming reference. Intel Corp., Mountain View, CA, USA, Tech. Rep (2016), 319433\u2013030."},{"key":"e_1_3_2_1_8_1","unstructured":"Intel Corporation. 2015. Introducing Intel Optane Technology - Bringing 3D XPoint Memory to Storage and Memory Products.  Intel Corporation. 2015. Introducing Intel Optane Technology - Bringing 3D XPoint Memory to Storage and Memory Products."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. https:\/\/doi.org\/10.1007\/978-3-662-04722-4  Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. https:\/\/doi.org\/10.1007\/978-3-662-04722-4","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_3_2_1_10_1","volume-title":"Caches and hash trees for efficient memory integrity verification","author":"Gassend Blaise","unstructured":"Blaise Gassend , G.\u00a0 Edward Suh , Dwaine Clarke , Marten Van\u00a0Dijk , and Srinivas Devadas . 2003. Caches and hash trees for efficient memory integrity verification . In HPCA. IEEE , 295\u2013306. Blaise Gassend, G.\u00a0Edward Suh, Dwaine Clarke, Marten Van\u00a0Dijk, and Srinivas Devadas. 2003. Caches and hash trees for efficient memory integrity verification. In HPCA. IEEE, 295\u2013306."},{"key":"e_1_3_2_1_11_1","volume-title":"A Write-Friendly and Fast-Recovery Scheme for Security Metadata in Non-Volatile Memories","author":"Huang Jianming","unstructured":"Jianming Huang and Yu Hua . 2021. A Write-Friendly and Fast-Recovery Scheme for Security Metadata in Non-Volatile Memories . In HPCA. IEEE , 359\u2013370. Jianming Huang and Yu Hua. 2021. A Write-Friendly and Fast-Recovery Scheme for Security Metadata in Non-Volatile Memories. In HPCA. IEEE, 359\u2013370."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Jungi Jeong Chang\u00a0Hyun Park Jaehyuk Huh and Seungryoul Maeng. 2018. Efficient Hardware-Assisted Logging with Asynchronous and Direct-Update for Persistent Memory. In MICRO (Fukuoka Japan) (MICRO-51). 520\u2013532.  Jungi Jeong Chang\u00a0Hyun Park Jaehyuk Huh and Seungryoul Maeng. 2018. Efficient Hardware-Assisted Logging with Asynchronous and Direct-Update for Persistent Memory. In MICRO (Fukuoka Japan) (MICRO-51). 520\u2013532.","DOI":"10.1109\/MICRO.2018.00049"},{"key":"e_1_3_2_1_13_1","volume-title":"ATOM: Atomic durability in non-volatile memory through hardware logging","author":"Joshi Arpit","year":"2017","unstructured":"Arpit Joshi , Vijay Nagarajan , Stratis Viglas , and Marcelo Cintra . 2017 . ATOM: Atomic durability in non-volatile memory through hardware logging . In HPCA. IEEE , 361\u2013372. Arpit Joshi, Vijay Nagarajan, Stratis Viglas, and Marcelo Cintra. 2017. ATOM: Atomic durability in non-volatile memory through hardware logging. In HPCA. IEEE, 361\u2013372."},{"key":"e_1_3_2_1_14_1","volume-title":"An efficient persistency and recovery mechanism for SGX-style integrity tree in secure NVM","author":"Lei Mengya","unstructured":"Mengya Lei , Fang Wang , Dan Feng , Fan Li , and Jie Xu. 2020. An efficient persistency and recovery mechanism for SGX-style integrity tree in secure NVM . In DATE. IEEE\/ACM , 702\u2013707. Mengya Lei, Fang Wang, Dan Feng, Fan Li, and Jie Xu. 2020. An efficient persistency and recovery mechanism for SGX-style integrity tree in secure NVM. In DATE. IEEE\/ACM, 702\u2013707."},{"key":"e_1_3_2_1_15_1","volume-title":"MICRO (New York","author":"Li Sheng","unstructured":"Sheng Li , Jung\u00a0Ho Ahn , Richard\u00a0 D. Strong , Jay\u00a0 B. Brockman , Dean\u00a0 M. Tullsen , and Norman\u00a0 P. Jouppi . 2009. McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures . In MICRO (New York , New York ) (MICRO 42). Association for Computing Machinery , New York, NY, USA, 469\u2013480. Sheng Li, Jung\u00a0Ho Ahn, Richard\u00a0D. Strong, Jay\u00a0B. Brockman, Dean\u00a0M. Tullsen, and Norman\u00a0P. Jouppi. 2009. McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures. In MICRO (New York, New York) (MICRO 42). Association for Computing Machinery, New York, NY, USA, 469\u2013480."},{"key":"e_1_3_2_1_16_1","volume-title":"Exploring high-performance and energy proportional interface for phase change memory systems","author":"Li Zhongqi","unstructured":"Zhongqi Li , Ruijin Zhou , and Tao Li. 2013. Exploring high-performance and energy proportional interface for phase change memory systems . In HPCA. IEEE , 210\u2013221. Zhongqi Li, Ruijin Zhou, and Tao Li. 2013. Exploring high-performance and energy proportional interface for phase change memory systems. In HPCA. IEEE, 210\u2013221."},{"key":"e_1_3_2_1_17_1","volume-title":"NIST Workshop on Modes of Operation.","author":"Lipmaa H","unstructured":"By\u00a0 H Lipmaa , P. Rogaway , and D. Wagner . 2000. Ctr-mode encryption, comments to nist concerning aes modes of operations . In NIST Workshop on Modes of Operation. By\u00a0H Lipmaa, P. Rogaway, and D. Wagner. 2000. Ctr-mode encryption, comments to nist concerning aes modes of operations. In NIST Workshop on Modes of Operation."},{"key":"e_1_3_2_1_18_1","volume-title":"Crash consistency in encrypted non-volatile main memory systems","author":"Liu Sihang","unstructured":"Sihang Liu , Aasheesh Kolli , Jinglei Ren , and Samira Khan . 2018. Crash consistency in encrypted non-volatile main memory systems . In HPCA. IEEE , 310\u2013323. Sihang Liu, Aasheesh Kolli, Jinglei Ren, and Samira Khan. 2018. Crash consistency in encrypted non-volatile main memory systems. In HPCA. IEEE, 310\u2013323."},{"key":"e_1_3_2_1_19_1","volume-title":"ThyNVM: Enabling software-transparent crash consistency in persistent memory systems","author":"Ren Jinglei","unstructured":"Jinglei Ren , Jishen Zhao , Samira Khan , Jongmoo Choi , Yongwei Wu , and Onur Mutiu . 2015. ThyNVM: Enabling software-transparent crash consistency in persistent memory systems . In MICRO. IEEE\/ACM , 672\u2013685. Jinglei Ren, Jishen Zhao, Samira Khan, Jongmoo Choi, Yongwei Wu, and Onur Mutiu. 2015. ThyNVM: Enabling software-transparent crash consistency in persistent memory systems. In MICRO. IEEE\/ACM, 672\u2013685."},{"key":"e_1_3_2_1_20_1","volume-title":"Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly","author":"Rogers Brian","unstructured":"Brian Rogers , Siddhartha Chhabra , Milos Prvulovic , and Yan Solihin . 2007. Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly . In MICRO. IEEE\/ACM , 183\u2013196. Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, and Yan Solihin. 2007. Using address independent seed encryption and bonsai merkle trees to make secure processors os-and performance-friendly. In MICRO. IEEE\/ACM, 183\u2013196."},{"key":"e_1_3_2_1_21_1","unstructured":"Andy\u00a0M Rudoff. 2016. Deprecating the pcommit instruction.  Andy\u00a0M Rudoff. 2016. Deprecating the pcommit instruction."},{"key":"e_1_3_2_1_22_1","volume-title":"Efficient Memory Integrity Verification and Encryption for Secure Processors","author":"Suh Edward","unstructured":"G.\u00a0 Edward Suh , Dwaine Clarke , Blaise Gassend , Marten\u00a0van Dijk , and Srinivas Devadas . 2003. Efficient Memory Integrity Verification and Encryption for Secure Processors . In MICRO. IEEE Computer Society , USA , 339. G.\u00a0Edward Suh, Dwaine Clarke, Blaise Gassend, Marten\u00a0van Dijk, and Srinivas Devadas. 2003. Efficient Memory Integrity Verification and Encryption for Secure Processors. In MICRO. IEEE Computer Society, USA, 339."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3195983"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898087"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961295.1950379"},{"key":"e_1_3_2_1_26_1","volume-title":"MorLog: Morphable Hardware Logging for Atomic Persistence in Non-Volatile Main Memory","author":"Wei Xueliang","unstructured":"Xueliang Wei , Dan Feng , Wei Tong , Jingning Liu , and Liuqing Ye. 2020. MorLog: Morphable Hardware Logging for Atomic Persistence in Non-Volatile Main Memory . In ISCA. IEEE , 610\u2013623. Xueliang Wei, Dan Feng, Wei Tong, Jingning Liu, and Liuqing Ye. 2020. MorLog: Morphable Hardware Logging for Atomic Persistence in Non-Volatile Main Memory. In ISCA. IEEE, 610\u2013623."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150019.1136502"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317869"},{"key":"e_1_3_2_1_29_1","volume-title":"Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories","author":"Ye Mao","year":"2018","unstructured":"Mao Ye , Clayton Hughes , and Amro Awad . 2018 . Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories . In MICRO. IEEE\/ACM , 403\u2013415. Mao Ye, Clayton Hughes, and Amro Awad. 2018. Osiris: A Low-Cost Mechanism to Enable Restoration of Secure Non-Volatile Memories. In MICRO. IEEE\/ACM, 403\u2013415."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786763.2694387"},{"key":"e_1_3_2_1_31_1","volume-title":"A durable and energy efficient main memory using phase change memory technology. ACM SIGARCH computer architecture news 37, 3","author":"Zhou Ping","year":"2009","unstructured":"Ping Zhou , Bo Zhao , Jun Yang , and Youtao Zhang . 2009. A durable and energy efficient main memory using phase change memory technology. ACM SIGARCH computer architecture news 37, 3 ( 2009 ), 14\u201323. Ping Zhou, Bo Zhao, Jun Yang, and Youtao Zhang. 2009. A durable and energy efficient main memory using phase change memory technology. ACM SIGARCH computer architecture news 37, 3 (2009), 14\u201323."},{"key":"e_1_3_2_1_32_1","volume-title":"Anubis: Ultra-Low Overhead and Recovery Time for Secure Non-Volatile Memories","author":"Zubair Kazi\u00a0Abu","year":"2019","unstructured":"Kazi\u00a0Abu Zubair and Amro Awad . 2019 . Anubis: Ultra-Low Overhead and Recovery Time for Secure Non-Volatile Memories . In ISCA. ACM\/IEEE , 157\u2013168. Kazi\u00a0Abu Zubair and Amro Awad. 2019. Anubis: Ultra-Low Overhead and Recovery Time for Secure Non-Volatile Memories. In ISCA. ACM\/IEEE, 157\u2013168."},{"key":"e_1_3_2_1_33_1","volume-title":"SuperMem: Enabling Application-Transparent Secure Persistent Memory with Low Overheads","author":"Zuo Pengfei","unstructured":"Pengfei Zuo , Yu Hua , and Yuan Xie . 2019. SuperMem: Enabling Application-Transparent Secure Persistent Memory with Low Overheads . In MICRO. IEEE\/ACM , 479\u2013492. Pengfei Zuo, Yu Hua, and Yuan Xie. 2019. SuperMem: Enabling Application-Transparent Secure Persistent Memory with Low Overheads. In MICRO. IEEE\/ACM, 479\u2013492."}],"event":{"name":"ICPP 2021: 50th International Conference on Parallel Processing","location":"Lemont IL USA","acronym":"ICPP 2021"},"container-title":["50th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472456.3472483","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472456.3472483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472456.3472483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"references-count":33,"alternative-id":["10.1145\/3472456.3472483","10.1145\/3472456"],"URL":"https:\/\/doi.org\/10.1145\/3472456.3472483","relation":{},"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"2021-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}