The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings.
DOI: 10.1109/hpca.2003.1183547
|View full text |Cite
|
Sign up to set email alerts
|

Caches and hash trees for efficient memory integrity verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
177
0

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 194 publications
(177 citation statements)
references
References 5 publications
0
177
0
Order By: Relevance
“…Other types of attacks have also been considered by researchers which we briefly discuss next. Work has been carried out to detect tampering of information stored in off-chip memory [7,5]. The hardware cost of detecting tampering is very high.…”
Section: Related Workmentioning
confidence: 99%
“…Other types of attacks have also been considered by researchers which we briefly discuss next. Work has been carried out to detect tampering of information stored in off-chip memory [7,5]. The hardware cost of detecting tampering is very high.…”
Section: Related Workmentioning
confidence: 99%
“…Gassend et al [24] propose a hash-tree based verification of untrusted external memory, providing a tamper-proof environment for program execution. The hash-tree based verification dramatically increases memory bandwidth requirements (~logN, where N is the memory size).…”
Section: Related Workmentioning
confidence: 99%
“…The use of untrustworthy data for jump target addresses can be prevented by tagging all data coming from untrustworthy channels [21,22]; however, this approach requires relatively complex tracking of spurious data propagation and may produce false alarms. More comprehensive secure architectures that are directly related to this work include execute-only memory (XOM) [1], an architecture for protecting critical secrets in microprocessors [23], an architecture for memory integrity verification [24], a XOM-like architecture with fast one-time-pad encryption [3], an architecture for runtime verification of instruction block signatures [4], and a hardware/software platform for intrusion prevention [9].…”
Section: Related Workmentioning
confidence: 99%
“…Aegis is the first secure processor to provide integrity verification for normal insecure memory (DRAM). It adopts the efficient memory integrity verification scheme proposed in [28], where the hash tree is cached. However, such optimizations were based on the locality in neighboring memory accesses, and therefore do not work for Path ORAM because Path ORAM shuffles the memory and always accesses random locations throughout the entire memory.…”
Section: Related Workmentioning
confidence: 99%