Caches and Merkle Trees for Efficient Memory Authentication
نویسندگان
چکیده
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10× overhead of a naive implementation.
منابع مشابه
Caches and Merkle Trees for E cient Memory Authentication
We describe a hardware scheme to authenticate all or a part of untrusted external memory using trusted on chip storage Our scheme uses Merkle trees and caches to e ciently authenticate memory Proper placement of Merkle tree checking and generation is critical to ensure good performance Na ve schemes where the Merkle tree machinery is placed between caches can result in a large increase in memor...
متن کاملMessage and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks
In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages ...
متن کامل-40pt ASSURE: Authentication Scheme for SecURE -5ptEnergy Efficient Non-Volatile Memories
Data tampering attacks threaten data integrity in emerging nonvolatile memories (NVMs). Whereas Merkle Tree (MT) memory authentication is e ective in thwarting data tampering attacks, it drastically increases cell writes and memory accesses, adversely impacting NVM energy, lifetime, and system performance. We propose ASSURE, a low overhead, high performance Authentication Scheme for SecURE ener...
متن کاملAn Efficient Scheme to Provide Real-time Memory Integrity Protection
Memory integrity protection has been a longstanding issue in trusted system design. Most viruses and malware attack the system by modifying data that they are not authorized to access. With the development of the Internet, viruses and malware spread much faster than ever before. In this setting, protecting the memory becomes increasingly important. However, it is a hard problem to protect the d...
متن کاملGuaranteeing memory integrity in secure processors with Dynamic Trees
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), significant efforts have been made to protect applications from host attacks. With the advent of open operating systems like Linux, it is has become even easier for adversaries to hack the OS and inflict such attacks. As a result, it is becoming increasingly difficult to trust OS for protecting soft...
متن کامل