Caches and Hash Trees for Efficient Memory Integrity Verification
نویسندگان
چکیده
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10× overhead of a naive implementation.
منابع مشابه
Efficient Memory Integrity Verification Schemes for Secure Processors
Single Chip Secure Processors have recently been proposed for variety of applications ranging from anti-piracy to trusted execution of distributed processes. Off-chip memory integrity verification and encryption are two fundamental tasks of a single-chip secure processor. Memory integrity verification is regarded as the main bottleneck in improving the performance of secure processors. Differen...
متن کاملCaches and Merkle Trees for Efficient Memory Authentication
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our method...
متن کاملHardware Mechanisms for Memory Integrity Checking
Memory integrity verification is a useful primitive when implementing secure processors that are resistant to attacks on hardware components. This paper proposes new hardware schemes to verify the integrity of untrusted external memory using a very small amount of trusted on-chip storage. Our schemes maintain incremental multiset hashes of all memory reads and writes at run-time, and can verify...
متن کاملHardware Mechanisms for Memory Authentication
Memory integrity verification is a useful primitive when implementing secure processors that are resistant to attacks on hardware components. This paper proposes new hardware schemes to verify the integrity of untrusted external memory using a very small amount of trusted on-chip storage. Our schemes maintain incremental multiset hashes of all memory reads and writes at run-time, and can verify...
متن کاملEfficient Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
An efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy was recently published in ACISP’15. It appears that three attacks menace this scheme. The first one enables the server to store only one block of a file m and still pass the data integrity verification on any number of file blocks. The second attack permits the server to keep the old version of a fil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003