Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploiting the persistence of RAM cells across reboots or power down cycles to read the memory contents and recover precious sensitive data. The principal defensive weapon against Cold Boot attacks is memory encryption. In this work we propose MemShield, a memory encryption framework for user space applications that exploits a GPU to safely store the master key and perform the encryption/decryption operations. We developed a prototype that is completely transparent to existing applications and does not require changes to the OS kernel. We discuss the design, the related works, the implementation, the security analysis, and the performances of MemSh...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploi...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive ...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Disk encryption has become an important security mea-sure for a multitude of clients, including gove...
Disk encryption has become an important security measure for a multitude of clients, including gover...
Abstract According to previous reports, information could be leaked from GPU memory; ...
Abstract — Memory scanning is a common technique used by malicious programs to read and modify the m...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks, which consist in exploi...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
Protecting the confidentiality of cryptographic keys in the event of partial or full system compromi...
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive ...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Disk encryption has become an important security mea-sure for a multitude of clients, including gove...
Disk encryption has become an important security measure for a multitude of clients, including gover...
Abstract According to previous reports, information could be leaked from GPU memory; ...
Abstract — Memory scanning is a common technique used by malicious programs to read and modify the m...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (...
As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit pred...