The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure data recoverability and data confidentiality. The enforcement of these two goals does not only put more burden on programmers but also degrades performance. To address this issue, we propose a hardware-assisted encrypted persistent memory system. Specifically, logging and data encryption are assisted by hardware. Furthermore, we apply the counter-based encryption and the cipher feedback (CFB) mode encryption to data and log respectively, reducing the encryption overhead. Our primary experimental results show that the transaction throughput of the proposed design outperforms the baseline design by up to 34.4%
A major security concern with outsourcing data storage to third-party providers is authenticating th...
Persistent memory (PMEM) technologies preserve data across power cycles and provide performance comp...
Oblivious RAM (ORAM) is a provable secure primitive to prevent access pattern leakage on the memory ...
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and d...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
We present the experimental evaluation of different security mechanisms applied to persistent state ...
Emerging byte-addressable nonvolatile memories (NVMs) promise persistent memory, which allows proces...
While logging has been adopted in persistent memory (PM) to support crash consistency, logging incur...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
Persistent memory (PMEM) allows direct access to persistent storage via a load/store interface. It p...
Confidential Computing is the protection of data in use from access or modification by any unauthori...
Datacenter operators have started deploying Persistent Memory (PM), leveraging its combination of fa...
Emerging fast, byte-addressable Persistent Memory (PM) considerably increases the storage performanc...
A major security concern with outsourcing data storage to third-party providers is authenticating th...
Persistent memory (PMEM) technologies preserve data across power cycles and provide performance comp...
Oblivious RAM (ORAM) is a provable secure primitive to prevent access pattern leakage on the memory ...
Write-ahead log and data encryption technologies are employed to ensure both crash consistency and d...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
We present the experimental evaluation of different security mechanisms applied to persistent state ...
Emerging byte-addressable nonvolatile memories (NVMs) promise persistent memory, which allows proces...
While logging has been adopted in persistent memory (PM) to support crash consistency, logging incur...
Fault-tolerant computer systems are increasingly being used in such applications as e-commerce, bank...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
Persistent memory (PMEM) allows direct access to persistent storage via a load/store interface. It p...
Confidential Computing is the protection of data in use from access or modification by any unauthori...
Datacenter operators have started deploying Persistent Memory (PM), leveraging its combination of fa...
Emerging fast, byte-addressable Persistent Memory (PM) considerably increases the storage performanc...
A major security concern with outsourcing data storage to third-party providers is authenticating th...
Persistent memory (PMEM) technologies preserve data across power cycles and provide performance comp...
Oblivious RAM (ORAM) is a provable secure primitive to prevent access pattern leakage on the memory ...