MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture 2021
DOI: 10.1145/3466752.3480067
|View full text |Cite
|
Sign up to set email alerts
|

Bonsai Merkle Forests: Efficiently Achieving Crash Consistency in Secure Persistent Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 52 publications
0
1
0
Order By: Relevance
“…Several studies proposed to maintain crash consistency and improve the performance of encryption in PM [8,9,16,53,93,94,99]. Some work proposed faster Merkle tree mechanisms to verify the integrity of PM [10,23,24,24,27,97,98]. Another branch of work reduces the exposure window of PM to reduce the attack surface of PM corruptions [88][89][90], even more so as cross-process attacks are feasible [58].…”
Section: Related Workmentioning
confidence: 99%
“…Several studies proposed to maintain crash consistency and improve the performance of encryption in PM [8,9,16,53,93,94,99]. Some work proposed faster Merkle tree mechanisms to verify the integrity of PM [10,23,24,24,27,97,98]. Another branch of work reduces the exposure window of PM to reduce the attack surface of PM corruptions [88][89][90], even more so as cross-process attacks are feasible [58].…”
Section: Related Workmentioning
confidence: 99%
“…In order to ensure the security of the main memory, integrity and confidentiality must be satisfied [9][10][11][12]. Confidentiality is achieved by encrypting data going from the processor to the external untrusted area.…”
Section: Introductionmentioning
confidence: 99%
“…Integrity ensures that the main memory correctly returns the last written data block to any address. An integrity tree is used to satisfy integrity and prevent replay attacks [9][10][11][12]. In counter-mode encryption, counters are managed by an integrity tree, where a memory write increases the corresponding counter.…”
Section: Introductionmentioning
confidence: 99%