Reducing the Overhead of Authenticated Memory Encryption Using Delta Encoding and ECC Memory

被引:8
|
作者
Yitbarek, Salessawi Ferede [1 ]
Austin, Todd [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
来源
2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC) | 2018年
关键词
D O I
10.1145/3195970.3196102
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data stored in an off-chip memory, such as DRAM or non-volatile main memory, can potentially be extracted or tampered by an attacker with physical access to a device. Protecting such attacks requires storing message authentication codes and counters which incur a 22% storage overhead. In this work, we propose techniques for reducing these overheads. We first present a scheme that leverages ECC DRAMs to reduce MAC verification & storage overheads. We replace the parity bits in standard ECC by a combination of MAC and parity bits to provide both authentication and error correction. This eliminates the extra MAC storage and minimizes the verification overhead as MACs can be read in parallel with data through the ECC bus. Next, we use efficient integer encodings to reduce counter storage overhead by 6x while enhancing application performance.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (04) : 1 - 38
  • [32] Sealer: In-SRAM AES for High-Performance and Low-Overhead Memory Encryption
    Zhang, Jingyao
    Naghibijouybari, Hoda
    Sadredini, Elaheh
    2022 ACM/IEEE INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, ISLPED 2022, 2022,
  • [33] ECC-Map: A Resilient Wear-Leveled Memory-Device Architecture with Low Mapping Overhead
    Peled, Natan
    Cassuto, Yuval
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON MEMORY SYSTEMS, MEMSYS 2023, 2023,
  • [34] Delta Counter: Bandwidth-Efficient Encryption Counter Representation for Secure GPU Memory
    Yuan, Shougang
    Awad, Amro
    Zhou, Huiyang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 101 - 113
  • [35] Recovery of encryption keys from memory using a linear scan
    Hargreaves, Christopher
    Chivers, Howard
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1369 - 1376
  • [36] Reducing Manipulation Overhead of Remote Data-Structure by Controlling Remote Memory Access Order
    Ajima, Yuichiro
    Nose, Takafumi
    Saga, Kazushige
    Shida, Naoyuki
    Sumimoto, Shinji
    HIGH PERFORMANCE COMPUTING, ISC HIGH PERFORMANCE 2016 INTERNATIONAL WORKSHOPS, 2016, 9945 : 85 - 97
  • [37] StealthTest: Low Overhead Online Software Testing using Transactional Memory
    Bobba, Jayaram
    Xiong, Weiwei
    Yen, Luke
    Hill, Mark D.
    Wood, David A.
    18TH INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PROCEEDINGS, 2009, : 146 - +
  • [38] Runtime-Guided ECC Protection using Online Estimation of Memory Vulnerability
    Jaulmes, Luc
    Moreto, Miquel
    Valero, Mateo
    Erez, Mattan
    Casas, Marc
    PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20), 2020,
  • [39] Reducing State Anxiety Using Working Memory Maintenance
    Balderston, Nicholas L.
    Hsiung, Abigail
    Liu, Jeffrey
    Ernst, Monique
    Grillon, Christian
    JOVE-JOURNAL OF VISUALIZED EXPERIMENTS, 2017, (125):
  • [40] EaD: ECC-Assisted Deduplication With High Performance and Low Memory Overhead for Ultra-Low Latency Flash Storage
    Wu, Suzhen
    Du, Chunfeng
    Zhu, Weidong
    Zhou, Jindong
    Jiang, Hong
    Mao, Bo
    Zeng, Lingfang
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (01) : 208 - 221