DocumentCode :
2453594
Title :
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly
Author :
Rogers, Brian ; Chhabra, Siddhartha ; Prvulovic, Milos ; Solihin, Yan
Author_Institution :
North Carolina State Univ., Raleigh
fYear :
2007
fDate :
1-5 Dec. 2007
Firstpage :
183
Lastpage :
196
Abstract :
In today´s digital world, computer security issues have become increasingly important. In particular, researchers have proposed designs for secure processors which utilize hardware-based memory encryption and integrity verification to protect the privacy and integrity of computation even from sophisticated physical attacks. However, currently proposed schemes remain hampered by problems that make them impractical for use in today´s computer systems: lack of virtual memory and inter-process communication support as well as excessive storage and performance overheads. In this paper, we propose 1) address independent seed encryption (AISE), a counter-mode based memory encryption scheme using a novel seed composition, and 2) Bonsai Merkle trees (BMT), a novel Merkle tree-based memory integrity verification technique, to eliminate these system and performance issues associated with prior counter-mode memory encryption and Merkle tree integrity verification schemes. We present both a qualitative discussion and a quantitative analysis to illustrate the advantages of our techniques over previously proposed approaches in terms of complexity, feasibility, performance, and storage. Our results show that AISE+BMT reduces the overhead of prior memory encryption and integrity verification schemes from 12% to 2% on average, while eliminating critical system-level problems.
Keywords :
cryptography; microprocessor chips; storage management; Bonsai Merkle trees; address independent seed encryption; computer security; counter-mode based memory encryption; hardware-based memory encryption; memory integrity verification; secure processors; Computer architecture; Computer security; Cryptography; Data security; Distributed computing; Educational institutions; Microarchitecture; Power system protection; Privacy; Process design;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Microarchitecture, 2007. MICRO 2007. 40th Annual IEEE/ACM International Symposium on
Conference_Location :
Chicago, IL
ISSN :
1072-4451
Print_ISBN :
978-0-7695-3047-5
Electronic_ISBN :
1072-4451
Type :
conf
DOI :
10.1109/MICRO.2007.16
Filename :
4408255
Link To Document :
بازگشت