首页> 外文会议>2018 55th ACM/ESDA/IEEE Design Automation Conference >ACME: Advanced Counter Mode Encryption for Secure Non-Volatile Memories
【24h】

ACME: Advanced Counter Mode Encryption for Secure Non-Volatile Memories

机译:ACME:用于安全非易失性内存的高级计数器模式加密

获取原文
获取原文并翻译 | 示例

摘要

Modern computing systems that integrate emerging non-volatile memories (NVMs) are vulnerable to classical security threats to data confidentiality (e.g., stolen DIMM and bus snooping attacks) as well as new security threats to system availability (e.g., denial of memory service (DoMS) attacks). Although counter mode encryption (CME) secures NVM-based main memories against confidentiality attacks, counter sizing is critical to balance tradeoffs between memory overhead, system performance, and re-encryption frequency (i.e., system availability). Furthermore, CME is particularly vulnerable to DoMS attacks, where a malicious application can severely impact memory availability by forcing frequent full memory re-encryption. This paper proposes Advanced Counter Mode Encryption, i.e., ACME, a low overhead CME-based main memory encryption solution to realize the twin security goals of confidentiality and availability in NVM-based main memories. At its core, ACME integrates counter write leveling (CWL) to reduce the frequency of full memory re-encryption while preserving the security properties of the underlying CME. Our evaluations on a phase change memory (PCM) architecture using SPEC CPU2006 benchmarks show that for a system availability of 99.999%, ACME not only requires 50% lower counter overhead, but also improves system performance by 20% in comparison to classical CME. When subject to a DoMS attack in the form of an unprivileged Linux process that sidesteps all levels of cache to constantly write to the same memory address to precipitate counter overflow, the ACME-based system provides 99.9% system availability in contrast to a classical CME-based system that is rendered non-operational.
机译:集成了新兴非易失性存储器(NVM)的现代计算系统容易受到传统的数据机密性安全威胁(例如,被盗的DIMM和总线侦听攻击)以及对系统可用性的新安全性威胁(例如,拒绝内存服务(DoMS)) )攻击)。尽管计数器模式加密(CME)可以保护基于NVM的主内存免受机密性攻击,但是计数器大小对于平衡内存开销,系统性能和重新加密频率(即系统可用性)之间的折衷至关重要。此外,CME特别容易受到DoMS攻击,在DoMS攻击中,恶意应用程序可能会通过强制进行频繁的完整内存重新加密而严重影响内存可用性。本文提出了高级计数器模式加密(即ACME),这是一种基于CME的低开销主内存加密解决方案,旨在实现基于NVM的主内存中机密性和可用性的双重安全性目标。 ACME在其核心处集成了计数器写平衡(CWL),以减少完整内存重新加密的频率,同时保留基础CME的安全性。我们使用SPEC CPU2006基准测试对相变存储器(PCM)架构进行的评估表明,对于99.999%的系统可用性,ACME不仅需要减少50%的计数器开销,而且与传统的CME相比还可以将系统性能提高20%。如果以无特权的Linux进程的形式遭受DoMS攻击,即绕过所有级别的缓存以不断写入同一内​​存地址以引发计数器溢出,则基于ACME的系统与传统的CME相比,可提供99.9%的系统可用性-基于基础的系统,使其无法运行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号