A Secure and Authenticated Host-to-Memory Communication Interface

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Emerging non-volatile memories (NVMs) have the potential to change the memory-storage hierarchy in computing devices, and even to replace DRAM as main memories. In fact NVMs, beside offering byte-addressability and data persistence, promise better scalability and higher capacity than DRAM. However, from a security point of view, the persistent nature of emerging memories provides a larger time window to exfiltrate data from a device with respect to current DRAM-based main memories, and NVMs have in general lower write endurance than DRAM, thus requiring wearout conscious encryption schemes. In this work we propose an architectural solution to secure non-volatile emerging memories, providing confidentiality, integrity and authenticity to the entire set of data, addresses and commands. Our solution relies on securing and authenticating the entire information transport between the host controller and the memory, enabling the storage of cleartext data inside the NVM. Such an approach allows to retain the advantage of differential write strategies without forsaking security. We validate our proposed architecture through the simulation of a set of software benchmarks on an embedded architecture, employing the gem5 trace-based architectural simulator.

Cite

CITATION STYLE

APA

Izzo, N., Breveglieri, L., Pelosi, G., & Amato, P. (2019). A Secure and Authenticated Host-to-Memory Communication Interface. In ACM International Conference on Computing Frontiers 2019, CF 2019 - Proceedings (pp. 386–391). Association for Computing Machinery, Inc. https://doi.org/10.1145/3310273.3323401

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free