This study presents an efficient persistent memory encryption mechanism, named Crystalor, which efficiently realizes a secure persistent/non-volatile memory based on an authentication tree with structural optimization, such as the split counter (SC). Crystalor can completely exploit the advantage of metadata compression techniques, whereas existing mechanisms are incompatible with such optimization. Meanwhile, Crystalor incurs almost no latency overhead under the nominal operation conditions for realizing the crash consistency/recoverability. We implement Crystalor with a state-of-the-art parallelizable authentication tree instance, namely ELM (IEEE TIFS 2022), and evaluate the effectiveness by both algorithmic analyses and system-level sim...
Persistent memory (PMEM) technologies preserve data across power cycles and provide performance comp...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Non-volatile memory is expected to coexist with (or even displace) volatile DRAM for main memory in ...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
Memory encryption with an authentication tree has received significant attentions due to the increas...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
International audienceThis paper presents the design of a P2P data persistent platform. Durable acce...
Emerging fast, byte-addressable Persistent Memory (PM) considerably increases the storage performanc...
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory d...
Storage Class Memory (SCM) is a novel class of memory technologies that promise to revolutionize dat...
We present a fully lock-free variant of our recent Montage system for persistent data structures. Th...
Memory integrity protection has been a longstanding issue in trusted system design. Most viruses and...
This paper presents the design of DataCube, a P2P data persistent platform. This platform exploits t...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Persistent memory (PMEM) technologies preserve data across power cycles and provide performance comp...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Non-volatile memory is expected to coexist with (or even displace) volatile DRAM for main memory in ...
The persistent memory (PM) requires maintaining the crash consistency and encrypting data, to ensure...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
Memory encryption with an authentication tree has received significant attentions due to the increas...
Persistent key-value stores (KVSs) are fundamental building blocks of modern software products. A KV...
International audienceThis paper presents the design of a P2P data persistent platform. Durable acce...
Emerging fast, byte-addressable Persistent Memory (PM) considerably increases the storage performanc...
Emerging byte-addressable Non-Volatile Memory (NVM) technology, although promising superior memory d...
Storage Class Memory (SCM) is a novel class of memory technologies that promise to revolutionize dat...
We present a fully lock-free variant of our recent Montage system for persistent data structures. Th...
Memory integrity protection has been a longstanding issue in trusted system design. Most viruses and...
This paper presents the design of DataCube, a P2P data persistent platform. This platform exploits t...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Persistent memory (PMEM) technologies preserve data across power cycles and provide performance comp...
The amount of trust that can be placed in commodity computing platforms is limited by the likelihood...
Non-volatile memory is expected to coexist with (or even displace) volatile DRAM for main memory in ...