Persistently-Secure Processors: Challenges and Opportunities for Securing Non-Volatile Memories

被引:14
作者
Awad, Amro [1 ]
Suboh, Suboh [1 ]
Ye, Mao [1 ]
Abu Zubair, Kazi [1 ]
Al-Wadi, Mazen [1 ]
机构
[1] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
来源
2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019) | 2019年
关键词
Persistently-Secure Processors; Security; Persistent Memory; Non-Volatile Memory; PERFORMANCE; ENCRYPTION;
D O I
10.1109/ISVLSI.2019.00114
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging Non-Volatile Memories (NVMs) are getting close to their mass production stage. The persistence feature of NVMs enables many interesting applications and capabilities such as fast restoration, staging and direct access of persistent files. On the other hand, data persistence enlarges the attack surface due to data remanence. Additionally, since the memory data is expected to be restored, any accompanying security metadata must he recovered and restored correctly. While the main concepts of secure processors have been there for decades, designing persistently secure processors that are able to maintain security across system crashes/reboots is particularly challenging due to the trade-offs between write-endurance, resilience, performance and security. In this paper, we discuss the recent advances in this domain, challenges and future research opportunities.
引用
收藏
页码:612 / 616
页数:5
相关论文
共 12 条
[1]  
Abu Zubair K., 2019, INT S COMP ARCH ISCA
[2]  
Awad A., 2019, INT S COMP ARCH ISCA
[3]   ObfusMem: A Low-Overhead Access Obfuscation for Trusted Memories [J].
Awad, Amro ;
Wang, Yipeng ;
Shands, Deborah ;
Solihin, Yan .
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017), 2017, :107-119
[4]   Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers [J].
Awad, Amro ;
Manadhata, Pratyusa ;
Haber, Stuart ;
Solihin, Yan ;
Horne, William .
ACM SIGPLAN NOTICES, 2016, 51 (04) :263-276
[5]  
Chhabra S, 2011, ISCA 2011: PROCEEDINGS OF THE 38TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE, P177, DOI 10.1145/2024723.2000086
[6]  
Gueron Shay., 2016, IACR CRYPTOL EPRINT, P204
[7]   Crash Consistency in Encrypted Non-Volatile Main Memory Systems [J].
Liu, Sihang ;
Kolli, Aasheesh ;
Ren, Jinglei ;
Khan, Samira .
2018 24TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), 2018, :310-323
[8]  
Micron, BREAKTHR NONV MEM TE
[9]   Using address independent seed encryption and Bonsai Merkle Trees to make secure processors OS- and performance-friendly [J].
Rogers, Brian ;
Chhabra, Siddhartha ;
Solihin, Yan ;
Prvulovic, Milos .
MICRO-40: PROCEEDINGS OF THE 40TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 2007, :183-+
[10]  
Yan CY, 2006, CONF PROC INT SYMP C, P179, DOI 10.1145/1150019.1136502