{"id":"https://openalex.org/W2944873096","doi":"https://doi.org/10.1145/3316781.3317869","title":"No Compromises","display_name":"No Compromises","publication_year":2019,"publication_date":"2019-05-23","ids":{"openalex":"https://openalex.org/W2944873096","doi":"https://doi.org/10.1145/3316781.3317869","mag":"2944873096"},"language":"en","primary_location":{"id":"doi:10.1145/3316781.3317869","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3316781.3317869","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 56th Annual Design Automation Conference 2019","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067183063","display_name":"Fan Yang","orcid":"https://orcid.org/0000-0002-3431-2585"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Yang","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052095173","display_name":"Youyou Lu","orcid":"https://orcid.org/0000-0002-6214-5390"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youyou Lu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028549167","display_name":"Youmin Chen","orcid":"https://orcid.org/0000-0003-4171-4299"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Youmin Chen","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008354867","display_name":"Haiyu Mao","orcid":"https://orcid.org/0000-0002-7393-4504"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyu Mao","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101740783","display_name":"Jiwu Shu","orcid":"https://orcid.org/0000-0002-7362-2789"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiwu Shu","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China, Beijing National Research Center for Information Science and Technology (BNRist)","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067183063"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":3.1834,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92479858,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8073813319206238},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6892390251159668},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.6628433465957642},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5072733759880066},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4966800808906555},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4804931879043579},{"id":"https://openalex.org/keywords/non-volatile-memory","display_name":"Non-volatile memory","score":0.47940585017204285},{"id":"https://openalex.org/keywords/data-consistency","display_name":"Data consistency","score":0.4412012994289398},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4365878105163574},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.43631595373153687},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3509896993637085},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.337252140045166},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.26471254229545593},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21503782272338867}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8073813319206238},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6892390251159668},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.6628433465957642},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5072733759880066},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4966800808906555},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4804931879043579},{"id":"https://openalex.org/C177950962","wikidata":"https://www.wikidata.org/wiki/Q10997658","display_name":"Non-volatile memory","level":2,"score":0.47940585017204285},{"id":"https://openalex.org/C93361087","wikidata":"https://www.wikidata.org/wiki/Q4426698","display_name":"Data consistency","level":2,"score":0.4412012994289398},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4365878105163574},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.43631595373153687},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3509896993637085},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.337252140045166},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.26471254229545593},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21503782272338867},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3316781.3317869","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3316781.3317869","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 56th Annual Design Automation Conference 2019","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1538663548","https://openalex.org/W1965912002","https://openalex.org/W2036853599","https://openalex.org/W2102449048","https://openalex.org/W2131284883","https://openalex.org/W2140972824","https://openalex.org/W2147657366","https://openalex.org/W2147926533","https://openalex.org/W2149627879","https://openalex.org/W2151396176","https://openalex.org/W2165961102","https://openalex.org/W2329990365","https://openalex.org/W2405325665","https://openalex.org/W2521042077","https://openalex.org/W2613071236","https://openalex.org/W2624758185","https://openalex.org/W2794768009","https://openalex.org/W2808855370","https://openalex.org/W2808958719","https://openalex.org/W2891342672","https://openalex.org/W2903705018","https://openalex.org/W2904587030","https://openalex.org/W2963087338","https://openalex.org/W3148657381","https://openalex.org/W4231426088","https://openalex.org/W4234716962","https://openalex.org/W4250686612"],"related_works":["https://openalex.org/W2392768766","https://openalex.org/W2058118494","https://openalex.org/W2382021449","https://openalex.org/W2095118173","https://openalex.org/W2104269053","https://openalex.org/W2106424170","https://openalex.org/W1985426483","https://openalex.org/W2501188010","https://openalex.org/W4299935056","https://openalex.org/W2010935248"],"abstract_inverted_index":{"Data":[0],"encryption":[1],"and":[2,138],"authentication":[3],"are":[4],"essential":[5],"for":[6,81],"secure":[7,110],"NVM.":[8,70],"However,":[9],"the":[10,43,57,65,78,85,95,120,127,140],"introduced":[11,75],"security":[12,58,99],"metadata":[13,59,100],"needs":[14],"to":[15,20,27,54,76,101,106,130,136],"be":[16],"atomically":[17],"written":[18],"back":[19],"NVM":[21],"along":[22],"with":[23],"data,":[24],"so":[25],"as":[26],"provide":[28],"crash":[29],"consistency,":[30],"which":[31],"unfortunately":[32],"incurs":[33],"high":[34],"overhead.":[35],"To":[36],"support":[37],"fine-grained":[38],"data":[39,82,89,128,143],"protection":[40],"without":[41],"compromising":[42],"performance,":[44],"we":[45,91],"propose":[46],"cc-NVM.":[47],"It":[48],"firstly":[49],"proposes":[50],"an":[51],"epoch-based":[52],"mechanism":[53],"aggressively":[55],"cache":[56,62],"in":[60,69],"CPU":[61],"while":[63,144],"retaining":[64],"consistency":[66],"of":[67,88,124],"them":[68],"Deferred":[71],"spreading":[72],"is":[73,134],"also":[74],"reduce":[77],"calculating":[79],"overhead":[80],"authentication.":[83],"Leveraging":[84],"hidden":[86],"ability":[87],"HMACs,":[90],"can":[92],"always":[93],"recover":[94],"consistent":[96],"but":[97],"old":[98],"its":[102],"newest":[103],"version.":[104],"Compared":[105],"Osiris,":[107],"a":[108],"state-of-the-art":[109],"NVM,":[111],"cc-NVM":[112,133],"improves":[113],"performance":[114],"by":[115,150],"20.4%":[116],"on":[117,152],"average.":[118,153],"When":[119],"system":[121],"crashes,":[122],"instead":[123],"dropping":[125],"all":[126],"due":[129],"malicious":[131],"attacks,":[132],"able":[135],"detect":[137],"locate":[139],"exact":[141],"tampered":[142],"only":[145],"incurring":[146],"extra":[147],"write":[148],"traffic":[149],"29.6%":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-05-29T00:00:00"}
