首页> 外文期刊>IEEE Transactions on Computers >Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks
【24h】

Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks

机译:惰性DRAM:对寒靴攻击的主动防御机制

获取原文
获取原文并翻译 | 示例
           

摘要

DRAMs in modern computers or hand-held devices store private or often security-sensitive data. Unfortunately, one known attack vector, called a cold boot attack, remains threatening and easy-to-exploit, especially when attackers have physical access to the device. It exploits the fundamental property of current DRAMs: remanence effects that retain the stored contents for a certain period of time even after powering off. To magnify the remanence effect, cold boot attacks typically freeze the victim DRAM, thereby providing a chance to detach, move, and reattach it to an attacker's computer. Once power is on, attackers can steal all the security-critical information from the victim's DRAM, such as a master decryption key for an encrypted disk storage. Two types of defenses were proposed in the past: 1) CPU-bound cryptography, where keys are stored in CPU registers and caches instead of in DRAMs, and 2) full or partial memory encryption, where sensitive data are stored encrypted. However, both methods impose non-negligible performance or energy overheads to the running systems, and worse, significantly increase the hardware and software manufacturing costs. We found that these proposed solutions attempted to address the cold boot attacks passively: either by avoiding or by indirectly addressing the root cause of the problem, the remanence effect. In this article, we propose and evaluate a proactive defense mechanism, Amnesiac DRAM, that comprehensively prevents the cold boot attacks. The key idea is to discard the contents in the DRAM when attackers attempt to retrieve (i.e., power on) them from the stolen DRAM. When Amnesiac DRAM senses a physical separation, it locks itself and deletes all the remaining contents, making it amnesiac. The Amnesiac DRAM causes neither performance nor energy overhead in ordinary operations (e.g., load and store) and can be easily implemented with negligible area overhead in commodity DRAM architectures.
机译:现代计算机或手持设备中的DRAM存储私人或经常安全敏感数据。不幸的是,一个已知的攻击载体称为冷启动攻击,仍然威胁且易于利用,特别是当攻击者对设备的物理访问时。它利用当前DRAM的基本属性:即使在电源电源后也将剩余的效果保持一段时间内的一段时间。为了放大剩余效果,冷启动攻击通常冻结受害者DRAM,从而提供了分离,移动和重新连接到攻击者的计算机的机会。一旦电源打开,攻击者可以从受害者的DRAM窃取所有安全关键信息,例如加密磁盘存储的主解密密钥。过去提出了两种类型的防御:1)CPU绑定密码,其中键存储在CPU寄存器中,并且在DRAM中存储,而且2)完整或部分内存加密,其中存储敏感数据。然而,两种方法都将不可忽略的性能或能量开销对运行系统强加,并且更糟糕的是,显着提高了硬件和软件制造成本。我们发现,这些提出的解决方案试图通过避免或间接地解决问题的根本原因来解决冷启动攻击,剩余效果。在本文中,我们提出并评估了一个主动的防御机制,漏洞DRAM,全面地阻止了冷启动攻击。当攻击者尝试从被盗DRAM检索(即,打开电源)时,关键的想法是丢弃DRAM中的内容。当怠速DRAM感应物理分离时,它锁定自身并删除所有剩余的内容,使其变得易变。惰性的DRAM在普通操作(例如,负载和存储)中既不是性能也不是能量开销,并且可以在商品DRAM架构中轻松实现,并且可以在商品DRAM架构中的可忽略区域开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号