{"id":"https://openalex.org/W3213193724","doi":"https://doi.org/10.1109/dac18074.2021.9586126","title":"LolliRAM: A Cross-Layer Design to Exploit Data Locality in Oblivious RAM","display_name":"LolliRAM: A Cross-Layer Design to Exploit Data Locality in Oblivious RAM","publication_year":2021,"publication_date":"2021-11-08","ids":{"openalex":"https://openalex.org/W3213193724","doi":"https://doi.org/10.1109/dac18074.2021.9586126","mag":"3213193724"},"language":"en","primary_location":{"id":"doi:10.1109/dac18074.2021.9586126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18074.2021.9586126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 58th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100364961","display_name":"Yi Wang","orcid":"https://orcid.org/0000-0002-5773-3817"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Wang","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032587346","display_name":"Weixuan Chen","orcid":"https://orcid.org/0000-0003-2323-5200"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weixuan Chen","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100561114","display_name":"Wang Xian-hua","orcid":null},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianhua Wang","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101724957","display_name":"Rui Mao","orcid":"https://orcid.org/0000-0002-3645-5520"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Mao","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100364961"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64391219,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1099","last_page":"1104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8423839807510376},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.7721297144889832},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6273804306983948},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6127781867980957},{"id":"https://openalex.org/keywords/locality-of-reference","display_name":"Locality of reference","score":0.5630492568016052},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4951418936252594},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.47638577222824097},{"id":"https://openalex.org/keywords/memory-controller","display_name":"Memory controller","score":0.4645409882068634},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4633024334907532},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.44136518239974976},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.42846810817718506},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.21831277012825012},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2097882330417633},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.11680826544761658},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09562623500823975}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8423839807510376},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.7721297144889832},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6273804306983948},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6127781867980957},{"id":"https://openalex.org/C27602214","wikidata":"https://www.wikidata.org/wiki/Q1868547","display_name":"Locality of reference","level":3,"score":0.5630492568016052},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4951418936252594},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.47638577222824097},{"id":"https://openalex.org/C100800780","wikidata":"https://www.wikidata.org/wiki/Q1175867","display_name":"Memory controller","level":3,"score":0.4645409882068634},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4633024334907532},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.44136518239974976},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.42846810817718506},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.21831277012825012},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2097882330417633},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.11680826544761658},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09562623500823975},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac18074.2021.9586126","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac18074.2021.9586126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 58th ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1988374166","https://openalex.org/W2054688000","https://openalex.org/W2160222995","https://openalex.org/W2166247408","https://openalex.org/W2170993700","https://openalex.org/W2613283858","https://openalex.org/W2625527027","https://openalex.org/W2766831041","https://openalex.org/W2808979509","https://openalex.org/W2809665154","https://openalex.org/W2903975607","https://openalex.org/W2945962313","https://openalex.org/W2981924205","https://openalex.org/W3092001024","https://openalex.org/W3092367582","https://openalex.org/W4238549726","https://openalex.org/W4244939384","https://openalex.org/W6752258822","https://openalex.org/W6784289454","https://openalex.org/W6820157634"],"related_works":["https://openalex.org/W1555349535","https://openalex.org/W2583128298","https://openalex.org/W2053359564","https://openalex.org/W2161159383","https://openalex.org/W1495260638","https://openalex.org/W1511204342","https://openalex.org/W2369125128","https://openalex.org/W2369223577","https://openalex.org/W2010020348","https://openalex.org/W1982580072"],"abstract_inverted_index":{"Oblivious":[0,113],"RAM":[1],"(ORAM)":[2],"conceals":[3],"memory":[4,31,43,92,143,156],"access":[5,93,203],"pattern":[6],"by":[7,26,205],"translating":[8],"a":[9,17,49,64,85,105,183],"single":[10],"read/write":[11],"operation":[12],"into":[13],"the":[14,30,36,54,68,124,131,146,167,173,176],"accesses":[15,144],"to":[16,29,108,210],"set":[18,184],"of":[19,38,72,141,148,170,178,185],"randomized":[20],"locations.":[21],"The":[22,139],"obliviousness":[23,73],"is":[24],"achieved":[25],"adding":[27],"redundancy":[28],"system,":[32],"which":[33],"comes":[34],"at":[35,79,145,175],"expense":[37],"increased":[39],"performance":[40,65],"overhead.":[41],"In":[42],"systems,":[44],"locality":[45,60,75,111,162],"has":[46],"always":[47],"been":[48],"critical":[50],"factor,":[51],"as":[52],"accessing":[53],"data":[55,100,110,125,149],"with":[56,212,218],"temporal":[57,159],"or":[58],"spatial":[59,161],"would":[61],"result":[62],"in":[63,84,95,112,127,136,151,216],"gain.":[66],"Although":[67],"two":[69,120],"design":[70,87,107],"considerations":[71],"and":[74,129,133,160,172],"may":[76],"seem":[77],"contradictory":[78],"first":[80],"glance,":[81],"combining":[82],"them":[83],"unified":[86],"can":[88,153,163,201],"potentially":[89],"hide":[90],"long":[91],"latency":[94,204],"ORAM":[96,117,137,152,179],"without":[97],"sacrificing":[98],"provable":[99],"security.This":[101],"paper":[102],"presents":[103],"LolliRAM,":[104],"cross-layer":[106],"exploit":[109],"RAM.":[114],"LolliRAM":[115,200],"optimizes":[116],"system":[118],"through":[119,166],"different":[121],"layers:":[122],"(i)":[123],"structure":[126,150],"ORAM,":[128],"(ii)":[130],"fast":[132],"secure":[134],"cache":[135],"controller.":[138,180],"reuse":[140],"redundant":[142],"layer":[147,177],"effectively":[154],"reduce":[155,202],"footprints.":[157],"Both":[158],"be":[164],"exploited":[165],"elastic":[168],"grouping":[169],"blocks":[171],"optimization":[174],"We":[181],"conduct":[182],"experiments":[186],"using":[187],"realistic":[188],"workloads":[189],"that":[190,199],"are":[191],"generated":[192],"from":[193],"standard":[194],"benchmarks.":[195],"Experimental":[196],"results":[197],"show":[198],"71.57%":[206],"on":[207],"average":[208],"(up":[209],"81.50%)":[211],"negligible":[213],"space":[214],"overhead":[215],"comparison":[217],"representative":[219],"schemes.":[220]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
