Towards constant bandwidth overhead integrity checking of untrusted data

被引:19
作者
Clarke, D [1 ]
Suh, GE [1 ]
Gassend, B [1 ]
Sudan, A [1 ]
van Dijk, M [1 ]
Devadas, S [1 ]
机构
[1] MIT, Comp Sci & Artificial Intelligene Lab, Cambridge, MA 02139 USA
来源
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2005年
关键词
D O I
10.1109/SP.2005.24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an adaptive tree-log scheme to improve the performance of checking the integrity of arbitrarily-large untrusted data, when using only a small fixed-sized trusted state. Currently, hash trees are used to check the data. In many systems that use hash trees, programs perform many data operations before performing a critical operation that exports a result outside of the program's execution environment. The adaptive tree-log scheme we present uses this observation to harness the power of the constant runtime bandwidth overhead of a log-based scheme. For all programs, the adaptive tree-log scheme's bandwidth overhead is guaranteed to never be worse than a parameterizable worst case bound. Furthermore, for all programs, as the average number of times the program accesses data between critical operations increases, the adaptive tree-log scheme's bandwidth overhead moves from a logarithmic to a constant bandwidth overhead.
引用
收藏
页码:139 / 153
页数:15
相关论文
共 12 条
  • [1] CHECKING THE CORRECTNESS OF MEMORIES
    BLUM, M
    EVANS, W
    GEMMELL, P
    KANNAN, S
    NAOR, M
    [J]. ALGORITHMICA, 1994, 12 (2-3) : 225 - 244
  • [2] Clarke D, 2003, LECT NOTES COMPUT SC, V2894, P188
  • [3] CLARKE D, 2004, 480 MIT CSAIL CSG
  • [4] Caches and hash trees for efficient memory integrity verification
    Gassend, B
    Suh, GE
    Clarke, D
    van Dijk, M
    Devadas, S
    [J]. NINTH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, PROCEEDINGS, 2003, : 295 - 306
  • [5] Software protection and simulation on oblivious RAMs
    Goldreich, O
    Ostrovsky, R
    [J]. JOURNAL OF THE ACM, 1996, 43 (03) : 431 - 473
  • [6] HALL E, 2002, CRYPTOLOGY EPRINT AR
  • [7] Hennessy John L., 1997, Computer Organization and Design: The Hardware/Software Interface, VSecond
  • [8] LIE D, 2003, THESIS STANFORD U
  • [9] Merkle RC, 1979, Secrecy, authentication, and public key systems
  • [10] Suh G Edward, 2003, Proceedings of the 17th annual international conference on Supercomputing, P357