{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:17:15Z","timestamp":1761664635210,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1145\/3620678.3624658","type":"proceedings-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T13:58:07Z","timestamp":1698760687000},"page":"233-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["KVSEV"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1539-229X","authenticated-orcid":false,"given":"Junseung","family":"You","sequence":"first","affiliation":[{"name":"ECE and ISRC, Seoul National University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2895-6351","authenticated-orcid":false,"given":"Kyeongryong","family":"Lee","sequence":"additional","affiliation":[{"name":"ECE and ISRC, Seoul National University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4513-1034","authenticated-orcid":false,"given":"Hyungon","family":"Moon","sequence":"additional","affiliation":[{"name":"UNIST, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7842-1719","authenticated-orcid":false,"given":"Yeongpil","family":"Cho","sequence":"additional","affiliation":[{"name":"Hanyang University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-2926","authenticated-orcid":false,"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"ECE and ISRC, Seoul National University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2022","article-title":"AMD Secure Encrypted Virtualization (SEV) - AMD. https:\/\/developer.amd.com\/sev\/","author":"AMD.","year":"2016","unstructured":"AMD. 2016. AMD Secure Encrypted Virtualization (SEV) - AMD. https:\/\/developer.amd.com\/sev\/. Accessed: 2022-03.","journal-title":"Accessed"},{"key":"e_1_3_2_1_2_1","volume-title":"White Paper","author":"AMD.","year":"2020","unstructured":"AMD. 2020. AMD SEV-SNP: Strengthening VM isolation with integrity protection and more. White Paper, January (2020)."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/github.com\/AMDESE\/linux. [Online","author":"Linux AMDESE.","year":"2022","unstructured":"AMDESE. 2016. AMDESE_Linux. https:\/\/github.com\/AMDESE\/linux. [Online; accessed 2022-03]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457312"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064030"},{"key":"e_1_3_2_1_6_1","volume-title":"Avocado: A Secure In-Memory Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Bailleu Maurice","year":"2021","unstructured":"Maurice Bailleu, Dimitra Giantsidi, Vasilis Gavrielatos, Vijay Nagarajan, Pramod Bhatotia, et al. 2021. Avocado: A Secure In-Memory Distributed Storage System. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). 65--79."},{"key":"e_1_3_2_1_7_1","volume-title":"17th USENIX Conference on File and Storage Technologies (FAST 19)","author":"Bailleu Maurice","year":"2019","unstructured":"Maurice Bailleu, J\u00f6rg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani. 2019. SPEICHER: Securing lsm-based key-value stores using shielded execution. In 17th USENIX Conference on File and Storage Technologies (FAST 19). 173--190."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495562"},{"key":"e_1_3_2_1_9_1","volume-title":"TinyCrypt - TinyCrypt Cryptographic Library. https:\/\/github.com\/tinycrypt. [Online","author":"Intel Corporation","year":"2022","unstructured":"Intel Corporation. 2017. TinyCrypt - TinyCrypt Cryptographic Library. https:\/\/github.com\/tinycrypt. [Online; accessed 2022-03]."},{"volume-title":"System programming.","author":"Devices A Micro","key":"e_1_3_2_1_10_1","unstructured":"A Micro Devices. 2006. AMD64 architecture programmer's manual volume 2: System programming."},{"key":"e_1_3_2_1_11_1","volume-title":"Secure encrypted virtualization is unsecure. arXiv preprint arXiv:1712.05090","author":"Du Zhao-Hui","year":"2017","unstructured":"Zhao-Hui Du, Zhiwei Ying, Zhenke Ma, Yufei Mai, Phoebe Wang, Jesse Liu, and Jesse Fang. 2017. Secure encrypted virtualization is unsecure. arXiv preprint arXiv:1712.05090 (2017)."},{"key":"e_1_3_2_1_12_1","volume-title":"Can you still trust your network card. CanSecWest\/core10","author":"Duflot Lo\u00efc","year":"2010","unstructured":"Lo\u00efc Duflot, Yves-Alexis Perez, Guillaume Valadon, and Olivier Levillain. 2010. Can you still trust your network card. CanSecWest\/core10 (2010), 24--26."},{"key":"e_1_3_2_1_13_1","volume-title":"Hardware mechanisms for memory authentication: A survey of existing techniques and engines. Transactions on Computational Science IV","author":"Elbaz Reouven","year":"2009","unstructured":"Reouven Elbaz, David Champagne, Catherine Gebotys, Ruby B Lee, Nachiketh Potlapally, and Lionel Torres. 2009. Hardware mechanisms for memory authentication: A survey of existing techniques and engines. Transactions on Computational Science IV (2009), 1--22."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146909.1147042"},{"key":"e_1_3_2_1_15_1","first-page":"2022","article-title":"TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus. https:\/\/www.nccgroup.com\/globalassets\/about-us\/us\/documents\/tpm-genie.pdf","author":"NCC Group","year":"2018","unstructured":"NCC Group. 2018. TPM Genie: Interposer Attacks Against the Trusted Platform Module Serial Bus. https:\/\/www.nccgroup.com\/globalassets\/about-us\/us\/documents\/tpm-genie.pdf. Accessed: 2022-11.","journal-title":"Accessed"},{"key":"e_1_3_2_1_16_1","first-page":"204","article-title":"A memory encryption engine suitable for general purpose processors","volume":"2016","author":"Gueron Shay","year":"2016","unstructured":"Shay Gueron. 2016. A memory encryption engine suitable for general purpose processors. IACR Cryptol. ePrint Arch. 2016 (2016), 204.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140607.3050763"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140607.3050763"},{"key":"e_1_3_2_1_20_1","first-page":"2023","article-title":"IBM's TPM 2.0 TSS. https:\/\/sourceforge.net\/projects\/ibmtpm20tss","author":"IBM.","year":"2019","unstructured":"IBM. 2019. IBM's TPM 2.0 TSS. https:\/\/sourceforge.net\/projects\/ibmtpm20tss. Accessed: 2023-09.","journal-title":"Accessed"},{"key":"e_1_3_2_1_21_1","first-page":"2023","article-title":"SGX documentation: sgx_create_monotonic_counter. https:\/\/software.intel.com\/en-us\/node\/696638","year":"2016","unstructured":"Intel. 2016. SGX documentation: sgx_create_monotonic_counter. https:\/\/software.intel.com\/en-us\/node\/696638. Accessed: 2023-09.","journal-title":"Accessed"},{"key":"e_1_3_2_1_22_1","first-page":"2022","article-title":"Intel Hardware Shield - Intel Total Memory Encryption. https:\/\/www.intel.com\/content\/dam\/www\/central-libraries\/us\/en\/documents\/white-paper-intel-tme.pdf","year":"2019","unstructured":"Intel. 2019. Intel Hardware Shield - Intel Total Memory Encryption. https:\/\/www.intel.com\/content\/dam\/www\/central-libraries\/us\/en\/documents\/white-paper-intel-tme.pdf. Accessed: 2022-04.","journal-title":"Accessed"},{"key":"e_1_3_2_1_23_1","first-page":"2022","article-title":"11th Generation Intel Core Processor Desktop. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/634648","year":"2021","unstructured":"Intel. 2021. 11th Generation Intel Core Processor Desktop. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/634648. Accessed: 2022-04.","journal-title":"Accessed"},{"key":"e_1_3_2_1_24_1","first-page":"2022","article-title":"12th Generation Intel Core Processors. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/655258","year":"2022","unstructured":"Intel. 2022. 12th Generation Intel Core Processors. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/655258. Accessed: 2022-04.","journal-title":"Accessed"},{"key":"e_1_3_2_1_25_1","volume-title":"Feb","author":"Kaplan David","year":"2017","unstructured":"David Kaplan. 2017. Protecting vm register state with sev-es. White paper, Feb (2017)."},{"key":"e_1_3_2_1_26_1","volume-title":"AMD memory encryption. White paper","author":"Kaplan David","year":"2016","unstructured":"David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White paper (2016)."},{"key":"e_1_3_2_1_27_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Kenjar Zijo","year":"2020","unstructured":"Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. 2020. V0LTpwn: Attacking x86 Processor Integrity from Software. In 29th USENIX Security Symposium (USENIX Security 20). 1445--1461."},{"volume-title":"20th USENIX Conference on File and Storage Technologies (FAST 22)","author":"Kim Igjae","key":"e_1_3_2_1_28_1","unstructured":"Igjae Kim, J. Hyun Kim, Minu Chung, HyunGon Moon, and Sam H. Noh. 2022. A Log-Structured Merge Tree-aware Message Authentication Scheme for Persistent Key-Value Stores. In 20th USENIX Conference on File and Storage Technologies (FAST 22). USENIX Association, Santa Clara, CA, 363--380. https:\/\/www.usenix.org\/conference\/fast22\/presentation\/kim-igjae"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303951"},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security Symposium.","author":"Kogler Andreas","year":"2022","unstructured":"Andreas Kogler, Daniel Gruss, and Michael Schwarz. 2022. Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks. In USENIX Security Symposium."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833768"},{"key":"e_1_3_2_1_32_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Li Mengyuan","year":"2019","unstructured":"Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, and Yan Solihin. 2019. Exploiting unprotected i\/o operations in amd's secure encrypted virtualization. In 28th USENIX Security Symposium (USENIX Security 19). 1257--1272."},{"key":"e_1_3_2_1_33_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Mengyuan","year":"2021","unstructured":"Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, and Yueqiang Cheng. 2021. CIPHERLEAKS: Breaking Constant-time Cryptography on AMDSEV via the Ciphertext Side Channel. In 30th USENIX Security Symposium (USENIX Security 21). 717--732."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CESYS.2018.8723998"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.103"},{"key":"e_1_3_2_1_36_1","first-page":"2022","article-title":"memcached - a distributed memory object caching system. http:\/\/memcached.org","year":"2014","unstructured":"MemCached. 2014. memcached - a distributed memory object caching system. http:\/\/memcached.org. Accessed: 2022-03.","journal-title":"Accessed"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300022"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193112"},{"key":"e_1_3_2_1_39_1","volume-title":"SEVerity: Code Injection Attacks against Encrypted Virtual Machines. arXiv preprint arXiv:2105.13824","author":"Morbitzer Mathias","year":"2021","unstructured":"Mathias Morbitzer, Sergej Proskurin, Martin Radev, Marko Dorfhuber, and Erick Quintanar Salas. 2021. SEVerity: Code Injection Attacks against Encrypted Virtual Machines. arXiv preprint arXiv:2105.13824 (2021)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354201"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3024853"},{"key":"e_1_3_2_1_43_1","unstructured":"Anja Rabich Thomas Eisenbarth and Luca Wilke. 2020. Software-based Undervolting Faults in AMD Zen Processors. (2020)."},{"key":"e_1_3_2_1_44_1","volume-title":"Exploiting Interfaces of Secure Encrypted Virtual Machines. In Reversing and Offensive-oriented Trends Symposium. 1--12","author":"Radev Martin","year":"2020","unstructured":"Martin Radev and Mathias Morbitzer. 2020. Exploiting Interfaces of Secure Encrypted Virtual Machines. In Reversing and Offensive-oriented Trends Symposium. 1--12."},{"key":"e_1_3_2_1_45_1","first-page":"2022","article-title":"Redis. https:\/\/redis.io","year":"2015","unstructured":"Redis. 2015. Redis. https:\/\/redis.io. Accessed: 2022-03.","journal-title":"Accessed"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408668"},{"key":"e_1_3_2_1_47_1","first-page":"2022","article-title":"Joerg Roedel. 2020. x86\/sev-es: Do not support MMIO to\/from encrypted memory. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/joro\/linux.git\/commit\/?h=sev-es-tip-updates&id=5282faf01e085d57658a39494ea760c2b7309f3d","author":"Roedel Joerg","year":"2020","unstructured":"Joerg Roedel. 2020. Joerg Roedel. 2020. x86\/sev-es: Do not support MMIO to\/from encrypted memory. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/joro\/linux.git\/commit\/?h=sev-es-tip-updates&id=5282faf01e085d57658a39494ea760c2b7309f3d. Accessed: 2022-01.","journal-title":"Accessed"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.44"},{"key":"e_1_3_2_1_49_1","first-page":"2022","article-title":"DDR2 800 Bus Analysis Probe. http:\/\/www.futureplus.com\/News-Releases\/fs2332_pr_010604.pdf","author":"System FuturePlus","year":"2016","unstructured":"FuturePlus System. 2016. DDR2 800 Bus Analysis Probe. http:\/\/www.futureplus.com\/News-Releases\/fs2332_pr_010604.pdf. Accessed: 2022-11.","journal-title":"Accessed"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177155"},{"key":"e_1_3_2_1_51_1","first-page":"38","article-title":"TPM Library Part 1: Architecture, Family \"2.0","volume":"01","author":"T.C.Group","year":"2019","unstructured":"T.C.Group. 2019. TPM Library Part 1: Architecture, Family \"2.0\", Level 00, Revision 01.38. http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_library_specification. Accessed: 2023-09.","journal-title":"Level 00, Revision"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_1_53_1","volume-title":"SEVurity: No Security Without Integrity: Breaking Integrity-Free Memory Encryption with Minimal Assumptions. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1483--1496","author":"Wilke Luca","year":"2020","unstructured":"Luca Wilke, Jan Wichelmann, Mathias Morbitzer, and Thomas Eisenbarth. 2020. SEVurity: No Security Without Integrity: Breaking Integrity-Free Memory Encryption with Minimal Assumptions. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1483--1496."},{"key":"e_1_3_2_1_54_1","volume-title":"KVM hello world. https:\/\/github.com\/dpw\/kvm-hello-world. [Online","author":"Wragg David","year":"2022","unstructured":"David Wragg. 2016. KVM hello world. https:\/\/github.com\/dpw\/kvm-hello-world. [Online; accessed 2022-03]."},{"key":"e_1_3_2_1_55_1","first-page":"2022","article-title":"YCSB. https:\/\/github.com\/brianfrankcooper\/YCSB","year":"2017","unstructured":"ycsb. 2017. YCSB. https:\/\/github.com\/brianfrankcooper\/YCSB. Accessed: 2022-03.","journal-title":"Accessed"},{"key":"e_1_3_2_1_56_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Zhao Shijun","year":"2019","unstructured":"Shijun Zhao, Qianying Zhang, Yu Qin, Wei Feng, and Dengguo Feng. 2019. Minimal kernel: an operating system architecture for TEE to resist board level physical attacks. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). 105--120."}],"event":{"name":"SoCC '23: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Santa Cruz CA USA","acronym":"SoCC '23"},"container-title":["Proceedings of the 2023 ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620678.3624658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620678.3624658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:52:42Z","timestamp":1755877962000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620678.3624658"}},"subtitle":["A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization"],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":56,"alternative-id":["10.1145\/3620678.3624658","10.1145\/3620678"],"URL":"https:\/\/doi.org\/10.1145\/3620678.3624658","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]},"assertion":[{"value":"2023-10-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}