{"id":"https://openalex.org/W4360831808","doi":"https://doi.org/10.1109/hpca56546.2023.10071003","title":"Root Crash Consistency of SGX-style Integrity Trees in Secure Non-Volatile Memory Systems","display_name":"Root Crash Consistency of SGX-style Integrity Trees in Secure Non-Volatile Memory Systems","publication_year":2023,"publication_date":"2023-02-01","ids":{"openalex":"https://openalex.org/W4360831808","doi":"https://doi.org/10.1109/hpca56546.2023.10071003"},"language":"en","primary_location":{"id":"doi:10.1109/hpca56546.2023.10071003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpca56546.2023.10071003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070778937","display_name":"Jianming Huang","orcid":"https://orcid.org/0000-0003-4159-6835"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianming Huang","raw_affiliation_strings":["Huazhong University of Science and Technology,Wuhan National Laboratory for Optoelectronics School of Computer","Wuhan National Laboratory for Optoelectronics School of Computer, Huazhong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,Wuhan National Laboratory for Optoelectronics School of Computer","institution_ids":["https://openalex.org/I4210138186"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics School of Computer, Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088998781","display_name":"Yu Hua","orcid":"https://orcid.org/0000-0001-7730-3796"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]},{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Hua","raw_affiliation_strings":["Huazhong University of Science and Technology,Wuhan National Laboratory for Optoelectronics School of Computer","Wuhan National Laboratory for Optoelectronics School of Computer, Huazhong University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,Wuhan National Laboratory for Optoelectronics School of Computer","institution_ids":["https://openalex.org/I4210138186"]},{"raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics School of Computer, Huazhong University of Science and Technology","institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070778937"],"corresponding_institution_ids":["https://openalex.org/I4210138186","https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.892,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78156662,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"152","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.802217960357666},{"id":"https://openalex.org/keywords/root-cause","display_name":"Root cause","score":0.7418835163116455},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.6607162356376648},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.5923974514007568},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.5684654116630554},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.537005603313446},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5199655294418335},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.474002480506897},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.47367411851882935},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4245925545692444},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3982553780078888},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3890223503112793},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3661932349205017},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.36139512062072754},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2716311514377594},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.2585621476173401},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14032068848609924},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09858188033103943},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08827000856399536}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.802217960357666},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.7418835163116455},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.6607162356376648},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.5923974514007568},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.5684654116630554},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.537005603313446},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5199655294418335},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.474002480506897},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.47367411851882935},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4245925545692444},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3982553780078888},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3890223503112793},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3661932349205017},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36139512062072754},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2716311514377594},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.2585621476173401},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14032068848609924},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09858188033103943},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08827000856399536},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpca56546.2023.10071003","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpca56546.2023.10071003","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W128319768","https://openalex.org/W1997933199","https://openalex.org/W2013028205","https://openalex.org/W2036853599","https://openalex.org/W2036899386","https://openalex.org/W2092337769","https://openalex.org/W2112753327","https://openalex.org/W2124926080","https://openalex.org/W2140972824","https://openalex.org/W2147657366","https://openalex.org/W2151396176","https://openalex.org/W2165310699","https://openalex.org/W2204664557","https://openalex.org/W2234174598","https://openalex.org/W2405325665","https://openalex.org/W2543951870","https://openalex.org/W2546100215","https://openalex.org/W2624758185","https://openalex.org/W2625240777","https://openalex.org/W2794768009","https://openalex.org/W2795148882","https://openalex.org/W2903617882","https://openalex.org/W2903705018","https://openalex.org/W2904587030","https://openalex.org/W2904713593","https://openalex.org/W2974290209","https://openalex.org/W2979935438","https://openalex.org/W2999811406","https://openalex.org/W3036826076","https://openalex.org/W3042219225","https://openalex.org/W3082429509","https://openalex.org/W3098066483","https://openalex.org/W3148657381","https://openalex.org/W3149870888","https://openalex.org/W3157584635","https://openalex.org/W3159625017","https://openalex.org/W3167682654","https://openalex.org/W3205086074","https://openalex.org/W3207969609","https://openalex.org/W4205643817","https://openalex.org/W4214700277","https://openalex.org/W4230377664","https://openalex.org/W4232019702","https://openalex.org/W4233429846","https://openalex.org/W4233509008","https://openalex.org/W4233872861","https://openalex.org/W4242574227","https://openalex.org/W4244889001","https://openalex.org/W4250215245","https://openalex.org/W4281737212","https://openalex.org/W6712237015"],"related_works":["https://openalex.org/W2030594396","https://openalex.org/W2535098331","https://openalex.org/W2885334669","https://openalex.org/W1594076216","https://openalex.org/W3045668461","https://openalex.org/W4255366506","https://openalex.org/W2202104725","https://openalex.org/W2354546531","https://openalex.org/W2056250485","https://openalex.org/W2068689476"],"abstract_inverted_index":{"Data":[0],"integrity":[1,17,24,32,35,44,123,156,237],"is":[2,47,81,109,164,202],"important":[3],"for":[4,49],"non-volatile":[5],"memory":[6],"(NVM)":[7],"systems":[8],"that":[9,145,232],"maintain":[10],"data":[11,16,155,191,248],"even":[12,198],"without":[13],"power.":[14],"The":[15,136],"in":[18,89,185,213],"NVM":[19,38],"may":[20],"be":[21,28,167],"compromised":[22],"by":[23,31,126],"attacks,":[25],"which":[26,108],"can":[27],"defended":[29],"against":[30],"verification":[33,210],"via":[34,211],"trees.":[36],"After":[37],"system":[39,72,95,158,194],"failures":[40,159],"and":[41,112,141,149,160,196],"reboots,":[42],"the":[43,57,63,69,76,79,84,91,94,118,121,129,143,170,190,193,200,207,223,235],"tree":[45,124,134,176,238],"root":[46,58,80,119,150,201,212],"responsible":[48],"providing":[50],"a":[51,102,217],"trusted":[52],"execution":[53],"environment.":[54],"However,":[55],"updating":[56,174],"incurs":[59],"latency":[60],"to":[61,68,115,153,166,220],"propagate":[62],"modifications":[64],"from":[65,169,225],"leaf":[66,86,147,171,226],"nodes":[67,148,172],"root.":[70],"If":[71],"crashes":[73,195],"occur":[74],"during":[75],"propagation":[77],"process,":[78],"inconsistent":[82],"with":[83,234],"updated":[85],"nodes,":[87],"resulting":[88],"misreporting":[90],"attacks":[92],"after":[93,157,192],"reboots.":[96,161],"In":[97],"this":[98],"paper,":[99],"we":[100,215],"propose":[101],"ShortCut":[103],"UpdatE":[104],"scheme,":[105],"called":[106],"SCUE,":[107],"an":[110],"efficient":[111],"low-latency":[113],"scheme":[114],"instantaneously":[116],"update":[117,239],"on":[120],"SGX-style":[122],"(SIT)":[125],"judiciously":[127],"overlooking":[128],"updates":[130],"upon":[131],"most":[132],"intermediate":[133],"nodes.":[135,227],"idea":[137],"behind":[138],"SCUE":[139,242],"explores":[140],"exploits":[142],"observation":[144],"consistent":[146],"are":[151],"enough":[152],"ensure":[154],"Moreover,":[162],"SIT":[163,186,224],"difficult":[165],"reconstructed":[168],"since":[173],"one":[175],"node":[177,181],"needs":[178],"its":[179],"parent":[180],"as":[182],"input.":[183],"Root":[184],"thus":[187],"cannot":[188],"verify":[189],"reboots":[197],"though":[199],"correctly":[203],"updated.":[204],"To":[205],"provide":[206],"ability":[208],"of":[209],"SIT,":[214],"use":[216],"counter-summing":[218],"approach":[219],"efficiently":[221],"reconstructing":[222],"Extensive":[228],"evaluation":[229],"results":[230],"show":[231],"compared":[233],"state-of-the-art":[236],"schemes,":[240],"our":[241],"delivers":[243],"high":[244],"performance":[245],"while":[246],"ensuring":[247],"integrity.":[249]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
