Dynamic Integrity Trees for Deployable Memory Authentication