2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA) 2022
DOI: 10.1109/hpca53966.2022.00071
|View full text |Cite
|
Sign up to set email alerts
|

Temporal Exposure Reduction Protection for Persistent Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…While sharing some conceptual similarities with the consolidation of small chunks into larger ones, GMLake adopts a stitchingbased technique, which minimizes the need for frequent data movement and copying, resulting in a significant enhancement of memory efficiency. Beyond conventional memory systems, recent research has also explored the defragmentation for persistent memories [84].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…While sharing some conceptual similarities with the consolidation of small chunks into larger ones, GMLake adopts a stitchingbased technique, which minimizes the need for frequent data movement and copying, resulting in a significant enhancement of memory efficiency. Beyond conventional memory systems, recent research has also explored the defragmentation for persistent memories [84].…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…However, the fragmentation problem is always accompanied with the data deduplication. We can explore defragmentation technologies [39] to mitigate this problem in an offline manner. On the other hand, since the random read performance of NVMs is much higher than that of SSDs/HDDs (Table 1), the fragmentation is no longer a critical problem for NVMbased storage systems.…”
Section: Discussionmentioning
confidence: 99%
“…Some work proposed faster Merkle tree mechanisms to verify the integrity of PM [10,23,24,24,27,97,98]. Another branch of work reduces the exposure window of PM to reduce the attack surface of PM corruptions [88][89][90], even more so as cross-process attacks are feasible [58].…”
Section: Related Workmentioning
confidence: 99%