Skip to Main content Skip to Navigation
Journal articles

Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines

Abstract : Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these platforms must provide since an adversary able to corrupt the memory space can affect the computations performed by the platform. After a description of the active attacks that threaten memory integrity, this paper surveys existing cryptographic techniques - namely integrity trees - allowing for memory authentication. The strategies proposed in the literature for implementing such trees on general-purpose computing platforms are presented, along with their complexity. This paper also discusses the effect of a potentially compromised Operating System (OS) on computing platforms requiring memory authentication and describes an architecture recently proposed to provide this security service despite an untrusted OS. Existing techniques for memory authentication that are not based on trees are described and their performance/security trade-off is discussed. While this paper focuses on memory authentication for uniprocessor platforms, we also discuss the security issues that arise when considering data authentication in symmetric multiprocessor (shared memory) systems.
Complete list of metadatas
Contributor : Martine Peridier <>
Submitted on : Tuesday, March 31, 2009 - 11:26:56 AM
Last modification on : Tuesday, June 26, 2018 - 1:18:48 AM

Links full text




Reouven Elbaz, David Champagne, Lionel Torres, Ruby B. Lee, Catherine Gebotys, et al.. Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. LNCS Transactions on Computational Science, Springer, 2009, Transactions on Computational Science IV - Special Issue on Security in Computing, LNCS (5430), pp.1-22. ⟨10.1007/978-3-642-01004-0_1⟩. ⟨lirmm-00372052⟩



Record views