{"id":"https://openalex.org/W3161335913","doi":"https://doi.org/10.1109/isqed51717.2021.9424292","title":"SeNonDiv: Securing Non-Volatile Memory using Hybrid Memory and Critical Data Diversion","display_name":"SeNonDiv: Securing Non-Volatile Memory using Hybrid Memory and Critical Data Diversion","publication_year":2021,"publication_date":"2021-04-07","ids":{"openalex":"https://openalex.org/W3161335913","doi":"https://doi.org/10.1109/isqed51717.2021.9424292","mag":"3161335913"},"language":"en","primary_location":{"id":"doi:10.1109/isqed51717.2021.9424292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011020204","display_name":"Arijit Nath","orcid":"https://orcid.org/0000-0003-4692-8472"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Arijit Nath","raw_affiliation_strings":["IIT Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"IIT Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023073321","display_name":"Manik B. Bhosle","orcid":null},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manik B. Bhosle","raw_affiliation_strings":["IIT Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"IIT Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070605948","display_name":"Hemangee K. Kapoor","orcid":"https://orcid.org/0000-0002-9376-7686"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Hemangee K. Kapoor","raw_affiliation_strings":["IIT Guwahati, Assam, India"],"affiliations":[{"raw_affiliation_string":"IIT Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011020204"],"corresponding_institution_ids":["https://openalex.org/I1317621060"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05916693,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":null,"first_page":"522","last_page":"528"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7634296417236328},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7406045794487},{"id":"https://openalex.org/keywords/dram","display_name":"Dram","score":0.7403426766395569},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5677772164344788},{"id":"https://openalex.org/keywords/non-volatile-memory","display_name":"Non-volatile memory","score":0.5331380367279053},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4729055166244507},{"id":"https://openalex.org/keywords/disk-encryption-hardware","display_name":"Disk encryption hardware","score":0.4669422209262848},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4510280191898346},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4504472017288208},{"id":"https://openalex.org/keywords/data-retention","display_name":"Data retention","score":0.42710593342781067},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37899720668792725},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35594475269317627},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.33031487464904785},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3246331810951233},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3046334981918335}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7634296417236328},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7406045794487},{"id":"https://openalex.org/C7366592","wikidata":"https://www.wikidata.org/wiki/Q1255620","display_name":"Dram","level":2,"score":0.7403426766395569},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5677772164344788},{"id":"https://openalex.org/C177950962","wikidata":"https://www.wikidata.org/wiki/Q10997658","display_name":"Non-volatile memory","level":2,"score":0.5331380367279053},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4729055166244507},{"id":"https://openalex.org/C61719626","wikidata":"https://www.wikidata.org/wiki/Q17081362","display_name":"Disk encryption hardware","level":5,"score":0.4669422209262848},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4510280191898346},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4504472017288208},{"id":"https://openalex.org/C2780866740","wikidata":"https://www.wikidata.org/wiki/Q5227345","display_name":"Data retention","level":2,"score":0.42710593342781067},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37899720668792725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35594475269317627},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.33031487464904785},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3246331810951233},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3046334981918335},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isqed51717.2021.9424292","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed51717.2021.9424292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1580417272","https://openalex.org/W1896786365","https://openalex.org/W1965253225","https://openalex.org/W1987550246","https://openalex.org/W2008867149","https://openalex.org/W2036329595","https://openalex.org/W2036853599","https://openalex.org/W2041420601","https://openalex.org/W2085447084","https://openalex.org/W2102449048","https://openalex.org/W2123815799","https://openalex.org/W2147657366","https://openalex.org/W2149627879","https://openalex.org/W2162764933","https://openalex.org/W2167804035","https://openalex.org/W2188534734","https://openalex.org/W2294399496","https://openalex.org/W2404547066","https://openalex.org/W2405325665","https://openalex.org/W2533624512","https://openalex.org/W2561827791","https://openalex.org/W2612907783","https://openalex.org/W2752650511","https://openalex.org/W2794505395","https://openalex.org/W2808855370","https://openalex.org/W2903617882","https://openalex.org/W2963786513","https://openalex.org/W3013138232","https://openalex.org/W3047916753","https://openalex.org/W3048250083","https://openalex.org/W4231426088","https://openalex.org/W4240606041","https://openalex.org/W4248373792","https://openalex.org/W6687432760","https://openalex.org/W6696906623","https://openalex.org/W6765961412","https://openalex.org/W6771327302"],"related_works":["https://openalex.org/W2539357035","https://openalex.org/W2130740493","https://openalex.org/W4379801595","https://openalex.org/W2744406407","https://openalex.org/W2765754337","https://openalex.org/W4283388250","https://openalex.org/W1025240641","https://openalex.org/W3214026606","https://openalex.org/W4319430330","https://openalex.org/W2783985713"],"abstract_inverted_index":{"The":[0,22],"emerging":[1],"Non-volatile":[2],"memories":[3,28],"are":[4],"projected":[5],"as":[6,79,81],"alternatives":[7],"of":[8,42,51,55,84,100,114],"traditional":[9],"DRAM-based":[10],"main":[11,118],"memories.":[12],"However,":[13],"their":[14],"non-volatility":[15],"feature":[16],"leads":[17],"to":[18,35,134],"serious":[19],"security":[20,73,106],"vulnerabilities.":[21],"sensitive":[23],"data":[24,37,47,99],"stored":[25],"in":[26,109,129],"these":[27,46],"can":[29],"be":[30],"easily":[31],"taken":[32],"away":[33],"due":[34],"prolonged":[36],"retention.":[38],"A":[39],"wide":[40],"variety":[41],"encryption-based":[43],"techniques":[44],"protect":[45],"at":[48],"the":[49,97,101,105,110],"cost":[50],"harmful":[52],"side":[53],"effects":[54],"encryption":[56,64,137,141],"algorithms":[57],"like":[58],"high":[59],"encryption/decryption":[60],"latency":[61],"and":[62,75,131,138],"increased":[63],"induced":[65],"write":[66],"activities.":[67],"It":[68],"launches":[69],"a":[70,91,115,135,139],"tug-of-war":[71],"between":[72],"provisioning":[74],"system":[76,120],"performance":[77,130],"degradation":[78],"well":[80],"shortened":[82],"lifetime":[83,132],"NVMs.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"propose":[90],"data-diversion":[92],"based":[93,142],"technique":[94],"that":[95],"protects":[96],"security-sensitive":[98],"applications":[102],"by":[103],"allocating":[104],"critical":[107],"pages":[108],"volatile":[111],"DRAM":[112],"part":[113],"DRAM-PCM":[116],"hybrid":[117],"memory":[119],"on":[121],"page":[122],"faults.":[123],"Experimental":[124],"evaluation":[125],"shows":[126],"significant":[127],"improvements":[128],"compared":[133],"partial":[136],"full":[140],"technique.":[143]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
