TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks

نویسندگان

  • Reouven Elbaz
  • David Champagne
  • Ruby B. Lee
  • Lionel Torres
  • Gilles Sassatelli
  • Pierre Guillemin
چکیده

Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay require a large amount of on-chip memory to provide tamper-proof storage for metadata such as hash values or nonces. Tree-based strategies can be deployed to reduce this unacceptable overhead; for example, the well-known Merkle tree technique decreases this overhead to a single hash value. However, it comes at the cost of performancekilling characteristics for embedded systems – e.g. non-parallelizable hash computations on tree updates. In this paper, we propose an alternative solution: the Tamper-Evident Counter Tree (TEC-Tree). It allows for tamper-evident offchip storage of the nonces involved in a replay countermeasure; TEC-Tree parallelizes the computations involved in both the authentication and tree update processes. Moreover, because our tree relies on block encryption, it provides data confidentiality at no extra cost. TEC-Tree is a deployable solution for memory integrity, with low performance hit and hardware cost.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Guaranteeing memory integrity in secure processors with Dynamic Trees

Due to the widespread software copyright violations (piracy, reverse engineering and tampering), significant efforts have been made to protect applications from host attacks. With the advent of open operating systems like Linux, it is has become even easier for adversaries to hack the OS and inflict such attacks. As a result, it is becoming increasingly difficult to trust OS for protecting soft...

متن کامل

Parallelizable Authentication Trees

We define a new authentication tree in the symmetric key setting, which has the same computational time, storage and security parameters as the well known Merkle authentication tree, but which unlike the latter, allows for all the cryptographic operations required for an update to be performed in parallel. As in Merkle authentication trees, the cryptographic operations required for verification...

متن کامل

Efficient Memory Integrity Verification Schemes for Secure Processors

Single Chip Secure Processors have recently been proposed for variety of applications ranging from anti-piracy to trusted execution of distributed processes. Off-chip memory integrity verification and encryption are two fundamental tasks of a single-chip secure processor. Memory integrity verification is regarded as the main bottleneck in improving the performance of secure processors. Differen...

متن کامل

Cadmium Removal from Aqueous Solutions Using Saxaul Tree Ash

Cadmium can be found in wastewater in high concentrations and can cause dangerous effect on aqueous environment and human health. At present, many methods have been used to heavy metals removal. Among this clean up techniques, adsorption techniques by using low-cost adsorbent are more considerable. In this study, batch adsorption experiments were conducted for removal of cadmium ions from a...

متن کامل

Energy efficient and trust metric based routing technique using collection tree protocol for WSNs

In this paper, a readily deployable trust and energy-aware routing protocol is presented. A distributed trust management system incorporating direct and indirect trust information is used to detect and avoid malicious nodes performing routing attacks as well as attacks threatening the reputation exchange process. Also, the energy-awareness is relied upon to extend the network lifetime. Although...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007