Font Size: a A A

Research On Memory Confidentiality And Integrity Protection Technology In Single Processor Architecture

Posted on:2011-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:J Q ZhangFull Text:PDF
GTID:2178360308452384Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Nowadays,more and more people are concerned about the data in their computer due to insecure environment. Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i.e. confidentiality protection and integrity protection. Confidentiality protection ensures that the data can't be understudied by attackers and integrity protection ensures that the data can't be tampered.We first introduce XOM and AEGIS architecture in single processor, and then introduce existing solutions of confidentiality protection and integrity protection separately.On memory integrity protection side, after analyzing the defect of hash tree, we design an improved solution, called Parallel Bonsai Merkle Tree, which based on Bonsai Merkle Tree, to make the write-bake operation parallel. Then we analyze the security of the solution and simulate it.On combination of confidentiality protection and integrity protection side, we improve the GCM mode, and combine it with Parallel Bonsai Merkle Tree. The main idea is to utilize the parallel process of GCM, because it can overlap authentication latency and memory access latency. After that, we improve a Hash Tree replace algorithm in cache. At last, we simulate and analyze the solution and the experiment result shows that the improved solution gets an improvement in efficiency.
Keywords/Search Tags:Memory Security, Confidentiality protection, Integrity protection, One-time Pad, Hash Tree, Galois/Counter Mode
PDF Full Text Request
Related items