The Locality of Memory Checking

被引:3
|
作者
Wang, Weijie [1 ]
Lu, Yujie [1 ]
Papamanthou, Charalampos [1 ]
Zhang, Fan [1 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
来源
PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023 | 2023年
基金
美国国家科学基金会;
关键词
Memory checking; foundations of cryptography;
D O I
10.1145/3576915.3623195
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Motivated by the extended deployment of authenticated data structures (e.g., Merkle Patricia Tries) for verifying massive amounts of data in blockchain systems, we begin a systematic study of the I/O efficiency of such systems. We first explore the fundamental limitations of memory checking, a previously-proposed abstraction for verifiable storage, in terms of its locality-a complexity measure that we introduce for the first time and is defined as the number of non-contiguous memory regions a checker must query to verifiably answer a read or a write query. Our central result is an Omega( log n/log log n) lower bound for the locality of any memory checker. Then we turn our attention to (dense and sparse) Merkle trees, one of the most celebrated memory checkers, and provide stronger lower bounds for their locality. For example, we show that any dense Merkle tree layout will have average locality at least 1/3 log n. Furthermore, if we allow node duplication, we show that if any write operation has at most polylog complexity, then the read locality cannot be less than log n/log log n. Our lower bounds help us construct two new locality-optimized authenticated data structures (DupTree and PrefixTree) which we implement and evaluate on random operations and real workloads, and which are shown to outperform traditional Merkle trees, especially as the number of leaves increases.
引用
收藏
页码:1820 / 1834
页数:15
相关论文
共 4 条
  • [1] Practical Memory Checking with Dr. Memory
    Bruening, Derek
    Zhao, Qin
    2011 9TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO), 2011, : 213 - 223
  • [2] The Complexity of Online Memory Checking
    Naor, Moni
    Rothblum, Guy N.
    JOURNAL OF THE ACM, 2009, 56 (01)
  • [3] Memory Checking Requires Logarithmic Overhead
    Boyle, Elette
    Komargodski, Ilan
    Vafa, Neekon
    PROCEEDINGS OF THE 56TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2024, 2024, : 1712 - 1723
  • [4] EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking
    Gao, Jian
    Xu, Yiwen
    Jiang, Yu
    Liu, Zhe
    Chang, Wanli
    Jiao, Xun
    Sun, Jiaguang
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (11) : 3420 - 3432