The security goals of cloud providers and users include memory confidentiality and integrity, which requires implementing Replay-Attack protection (RAP). RAP can be achieved using integrity trees or mutually authenticated channels. Integrity trees incur significant performance overheads and are impractical for protecting large memories. Mutually authenticated channels have been proposed only for packetized memory interfaces that address only a very small niche domain and require fundamental changes to memory system architecture. We propose SecDDR, a low-cost RAP that targets direct-attached memories, like DDRx. SecDDR avoids memory-side data authentication, and thus, only adds a small amount of logic to memory components and does not change...
Memory integrity protection is crucial for many applications that store critical data in the memory....
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Trusting the data center and remote computing infrastructure is crucial for the users to move their ...
Confidential Computing is the protection of data in use from access or modification by any unauthori...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Securing off-chip main-memories is an integral component of trusted-execution environments like Inte...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Memory encryption with an authentication tree has received significant attentions due to the increas...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Our objective is to protect the integrity and confidentiality of applications operating in untrusted...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
Memory integrity protection is crucial for many applications that store critical data in the memory....
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Trusting the data center and remote computing infrastructure is crucial for the users to move their ...
Confidential Computing is the protection of data in use from access or modification by any unauthori...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Securing off-chip main-memories is an integral component of trusted-execution environments like Inte...
This study presents an efficient persistent memory encryption mechanism, named Crystalor, which effi...
Memory encryption with an authentication tree has received significant attentions due to the increas...
The complexity of computer programs has been increasing for multiple decades. As a result, the numbe...
The wide adoption of cloud computing has established integrity and confidentiality of data in memory...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Our objective is to protect the integrity and confidentiality of applications operating in untrusted...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
Memory integrity protection is crucial for many applications that store critical data in the memory....
In order to prevent rainbow attacks against a stolen password database, most passwords are appended ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...