Towards Phase Change Memory as a Secure Main Memory
نویسنده
چکیده
Phase change memory (PCM) technology appears as more scalable than DRAM technology. As PCM exhibits access time slightly longer but in the same range as DRAMs, several recent studies have proposed to use PCMs for designing main memory systems. Unfortunately PCM technology suffers from a limited write endurance; typically each memory cell can be only be written a large but still limited number of times (107 to 109 writes are reported for current technology). Till now, research proposals have essentially focused their attention on designing memory systems that will survive to the average behavior of conventional applications. However PCM memory systems should be designed to survive worst-case applications, i.e., malicious attacks targeting the physical destruction of the memory through overwriting a limited number of memory cells. In this paper, we propose the design of a secure PCM-based main memory that would by construction survive to overwrite attacks. In order to prevent a malicious user to overwrite some memory cells, the physical memory address (PA) manipulated by the computer system is not the same as the PCM memory address (PCMA). PCMA is made invisible from the rest of the computer system. The PCM memory controller is in charge of the PA-to-PCMA translation . Hiding PCMA alone does not prevent a malicious user to overwrite a PCM memory word. Therefore in the secure PCM-based main memory, PA-to-PCMA translation is continuously modified through a random process, such preventing a malicious user to overwrite some PCM memory words. PCM address invisibility and continuous random PA-to-PCMA translation ensures security against an overwrite attack as well it ensures a practical write endurance close to the theoretical maximum. The hardware overhead needed to ensure this security in the PCM controller includes a random number generator and a medium large address translation table. Key-words: Emerging memory technology, security in ria -0 04 30 01 0, v er si on 2 10 N ov 2 00 9 Towards Phase Change Memory as a Secure Main Memory Résumé : Phase Change Memory est une technologie mémoire émergente qui apparait comme un concurrent potentiel de la technologie DRAM. Dans ce rapport, nous présentons le design d’une mémoire principale utilisant ce type de technologie et résistant aux attaques par sur-écriture. Mots-clés : Nouvelle technologie mmoire, sécurité in ria -0 04 30 01 0, v er si on 2 10 N ov 2 00 9 Towards Phase Change Memory as a Secure Main Memory 3 Towards Phase Change Memory as a Secure Main Memory André Seznec Centre de Recherche INRIA Rennes Bretagne-Atlantique Campus de Beaulieu, 35042 Rennes Cedex, France [email protected]
منابع مشابه
Adaptive Tunable Vibration Absorber using Shape Memory Alloy
This study presents a new approach to control the nonlinear dynamics of an adaptive absorber using shape memory alloy (SMA) element. Shape memory alloys are classified as smart materials that can remember their original shape after deformation. Stress and temperature-induced phase transformations are two typical behaviors of shape memory alloys. Changing the stiffness associated with phase tran...
متن کاملAnnouncing the Final Examination of Jingfei Kong for the degree of Doctor of Philosophy Time & Location: June 18, 2010 at 2:00 PM in HEC 302 Title: ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY
We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as cost efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes ...
متن کاملAnnouncing the Final Examination of Jingfei Kong for the degree of Doctor of Philosophy Time & Location: June 18, 2010 at 2:00 PM in HEC 302 Title: ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY
We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as cost efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes ...
متن کاملAnnouncing the Final Examination of Jingfei Kong for the degree of Doctor of Philosophy Time & Location: June 18, 2010 at 2:00 PM in HEC 302 Title: ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY
We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as cost efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes ...
متن کامل