首页> 外文会议>International symposium on computer architecture >Security Refresh: Prevent Malicious Wear-out and Increase Durability for Phase-Change Memory with Dynamically Randomized Address Mapping
【24h】

Security Refresh: Prevent Malicious Wear-out and Increase Durability for Phase-Change Memory with Dynamically Randomized Address Mapping

机译:安全刷新:防止具有动态随机地址映射的相变内存的恶意泄出并提高相变内存的耐用性

获取原文

摘要

Phase change memory (PCM) is an emerging memory technology for future computing systems. Compared to other non-volatile memory alternatives, PCM is more matured to production, and has a faster read latency and potentially higher storage density. The main roadblock precluding PCM from being used, in particular, in the main memory hierarchy, is its limited write endurance. To address this issue, recent studies proposed to either reduce PCM's write frequency or use wear-leveling to evenly distribute writes. Although these techniques can extend the lifetime of PCM, most of them will not prevent deliberately designed malicious codes from wearing it out quickly. Furthermore, all the prior techniques did not consider the circumstances of a compromised OS and its security implication to the overall PCM design. A compromised OS will allow adversaries to manipulate processes and exploit side channels to accelerate wear-out. In this paper, we argue that a PCM design not only has to consider normal wear-out under normal application behavior, most importantly, it must take the worst-case scenario into account with the presence of malicious exploits and a compromised OS to address the durability and security issues simultaneously. In this paper, we propose a novel, low-cost hardware mechanism called Security Refresh to avoid information leak by constantly migrating their physical locations inside the PCM, obfuscating the actual data placement from users and system software. It uses a dynamic randomized address mapping scheme that swaps data using random keys upon each refresh due. The hardware overhead is tiny without using any table. The best lifetime we can achieve under the worst-case malicious attack is more than six years. Also, our scheme incurs around 1 % performance degradation for normal program operations.
机译:相变存储器(PCM)是未来计算系统的新兴内存技术。与其他非易失性存储器替代方案相比,PCM更成熟到生产,并且具有更快的读取延迟和潜在更高的存储密度。专门使用PCM的主要障碍尤其是在主存储层次结构中,是其有限的写耐久性。为了解决这个问题,最近的研究建议减少PCM的写入频率或使用磨损均匀分布写入。虽然这些技术可以延长PCM的寿命,但大多数都不会防止故意设计的恶意代码快速佩戴它。此外,所有先前的技术都没有考虑受损操作系统的情况及其对整体PCM设计的安全含义。受损的操作系统将允许对手操纵流程并利用侧视通道以加速磨损。在本文中,我们认为PCM设计不仅必须在正常的应用行为下考虑正常磨损,最重要的是,在存在恶意漏洞和受损的操作系统的情况下,它必须考虑最糟糕的情况。耐用性和安全问题同时。在本文中,我们提出了一种新颖的,低成本的硬件机制,称为安全刷新,以避免信息泄漏,通过不断在PCM内部迁移其物理位置,使来自用户和系统软件的实际数据放置。它使用动态随机地址映射方案,该方案在每个刷新时使用随机键在每个刷新时交换数据。硬件开销是微小的,而不使用任何表。我们可以在最坏情况下实现的最好的寿命超过六年。此外,我们的计划会导致正常计划操作的绩效劣化大约1%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号