Using address independent seed encryption and Bonsai Merkle Trees to make secure processors OS- and performance-friendly

被引:161
作者
Rogers, Brian [1 ]
Chhabra, Siddhartha [1 ]
Solihin, Yan [1 ]
Prvulovic, Milos [2 ]
机构
[1] North Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
[2] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
来源
MICRO-40: PROCEEDINGS OF THE 40TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE | 2007年
基金
美国国家科学基金会;
关键词
D O I
10.1109/MICRO.2007.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In today's digital world, computer security issues have become increasingly important In particular researchers have proposed designs for secure processors which utilize hardware-based memory encryption and integrity verification to protect the privacy and integrity of computation even from sophisticated physical attacks. However currently proposed schemes remain hampered by problems that make them impractical for use in today's computer systems: lack of virtual memory and Inter-Process Communication support as well as excessive storage and performance overheads. In this paper we propose 1) Address Independent Seed Encryption (AISE), a counter-mode based memory encryption scheme using a novel seed composition, and 2) Bonsai Merkle Trees (BMT), a novel Merkle Tree-based memory integrity verification technique, to eliminate these system and performance issues associated with prior counter-mode memory encryption and Merkle Tree integrity verification schemes. We present both a qualitative discussion and a quantitative analysis to illustrate the advantages of our techniques over previously proposed approaches in terms of complexity, feasibility, performance, and storage. Our results show that AISE+BMT reduces the overhead of prior memory encryption and integrity verification schemes from 12% to 2% on average, while eliminating critical system-level problems.
引用
收藏
页码:183 / +
页数:2
相关论文
共 27 条
[1]  
[Anonymous], P 9 INT C ARCH SUPP
[2]  
*FIPS, 2001, FIPS PUBL, V197
[3]  
FIPS Publication, 1995, FIPS PUBL, P180
[4]  
GAO L, 2006, P 15 INT C PAR ARCH
[5]  
GASSEND B., 2003, P 9 INT S HIGH PERF
[6]  
GILMONT T, 1999, P 25 EUROMICRO C
[7]   The trusted PC: Skin-deep security [J].
Huang, A .
COMPUTER, 2002, 35 (10) :103-105
[8]  
Huang Andrew, 2003, HACKING XBOX INTRO R
[9]  
*IBM, 2006, IBM EXT ENH DAT SEC
[10]  
Kgil T., 2004, P WORKSH ARCH SUPP S