Advertisement

Security Memory System for Mobile Device or Computer Against Memory Attacks

  • Genxian LiuEmail author
  • Xi Zhang
  • Dongsheng Wang
  • Zhenyu Liu
  • Haixia Wang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 426)

Abstract

Security is a crucial element of information systems. Extensive research for cryptographic algorithms that provide the sound theoretical basis of security. Among them security and integrity of memory has been a longstanding issue in trusted system design. Main memory is a critical component of all computing systems. Most of those systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended hardware, obtains the decryption keys from memory. We propose a method for protecting memory systems against attacks with hardware authentication and full memory encryption. The method is secure against all known type of memory attack. We have tested the method with software simulator and Field Programmable Gate Array (FPGA) platform. The results show that the method can authenticate and encrypt the contents of DRAM with 2.5 % performance penalties.

Keywords

Security Memory system Computer Attacks 

Notes

Acknowledgement

This work is supported by the Natural Science Foundation of China under Grant No.61300014.

References

  1. 1.
    Skorobogatov, S.: Low temperature data remanence in static RAM. University of Cambridge Computer Laborary Technical Report (2002)Google Scholar
  2. 2.
    Halderman, J.A., Schoen, S.D., Heninger, N., et al.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)CrossRefGoogle Scholar
  3. 3.
    Kgil, T., Falk, L., Mudge, T.: Chiplock: support for secure microarchitectures. ACM SIGARCH Comput. Archit. News 33, 134–143 (2005)CrossRefGoogle Scholar
  4. 4.
    Lee, R.B., Kwan, P.C.S., et al.: Architecture for protecting critical secrets in microprocessors. In: The 32nd Annual International Symposium on Computer Architecture (ISCA ‘05), Washington, DC (2005)Google Scholar
  5. 5.
    Rosenfeld, P., Cooper-Balis, E., Jacob, B.: DRAMSim2: a cycle accurate memory system simulator. Comput. Archit. Lett. 10, 16–19 (2011)CrossRefGoogle Scholar
  6. 6.
    Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Jacob, B., Ng, S.W., Wang, D.T., et al.: Memory Systems: Cache, DRAM, Disk. Morgan Kaufmann, San Francisco (2007)Google Scholar
  8. 8.
    Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)Google Scholar
  9. 9.
    Hall, W., Jutla, C.S.: Parallelizable authentication trees. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 95–109. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Elbaz, R., Champagne, D., Lee, R.B., Torres, L., Sassatelli, G., Guillemin, P.: TEC-Tree: a low-cost, parallelizable tree for efficient defense against memory replay attacks. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 289–302. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Genxian Liu
    • 1
    Email author
  • Xi Zhang
    • 2
  • Dongsheng Wang
    • 1
  • Zhenyu Liu
    • 1
  • Haixia Wang
    • 1
  1. 1.Tsinghua National Laboratory for Information Science and Technology, Department of Computer Science and TechnologyTsinghua UniversityBeijingChina
  2. 2.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations