Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines

Abstract : Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these platforms must provide since an adversary able to corrupt the memory space can affect the computations performed by the platform. After a description of the active attacks that threaten memory integrity, this paper surveys existing cryptographic techniques - namely integrity trees - allowing for memory authentication. The strategies proposed in the literature for implementing such trees on general-purpose computing platforms are presented, along with their complexity. This paper also discusses the effect of a potentially compromised Operating System (OS) on computing platforms requiring memory authentication and describes an architecture recently proposed to provide this security service despite an untrusted OS. Existing techniques for memory authentication that are not based on trees are described and their performance/security trade-off is discussed. While this paper focuses on memory authentication for uniprocessor platforms, we also discuss the security issues that arise when considering data authentication in symmetric multiprocessor (shared memory) systems.
Type de document :
Article dans une revue
LNCS Transactions on Computational Science, Springer, 2009, Transactions on Computational Science IV - Special Issue on Security in Computing, LNCS (5430), pp.1-22. 〈10.1007/978-3-642-01004-0_1〉
Liste complète des métadonnées

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00372052
Contributeur : Martine Peridier <>
Soumis le : mardi 31 mars 2009 - 11:26:56
Dernière modification le : mardi 26 juin 2018 - 01:18:48

Lien texte intégral

Identifiants

Collections

Citation

Reouven Elbaz, David Champagne, Lionel Torres, Ruby B. Lee, Catherine Gebotys, et al.. Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. LNCS Transactions on Computational Science, Springer, 2009, Transactions on Computational Science IV - Special Issue on Security in Computing, LNCS (5430), pp.1-22. 〈10.1007/978-3-642-01004-0_1〉. 〈lirmm-00372052〉

Partager

Métriques

Consultations de la notice

126