2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA) 2020
DOI: 10.1109/isca45697.2020.00066
|View full text |Cite
|
Sign up to set email alerts
|

Compact Leakage-Free Support for Integrity and Reliability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…Synergy [24] places the MAC inside the ECC chip in a 9-chip ECC-DIMMs and demonstrates that MAC can be used to detect not only data tampering but also memory errors. ITESP [28] uses small counters to save space in the tree node. The ECCs of the child nodes are XORed, and the XORed ECC is embedded in the parent node in ITESP.…”
Section: Recovery Schemementioning
confidence: 99%
“…Synergy [24] places the MAC inside the ECC chip in a 9-chip ECC-DIMMs and demonstrates that MAC can be used to detect not only data tampering but also memory errors. ITESP [28] uses small counters to save space in the tree node. The ECCs of the child nodes are XORed, and the XORed ECC is embedded in the parent node in ITESP.…”
Section: Recovery Schemementioning
confidence: 99%
“…Similarly, Morphable [42] packs more encryption counters in a single cache line, which results in a smaller integrity tree and increases its cacheability. Taassori et al [46] proposed using separate integrity trees and separate security metadata caches for each application to prevent side-channel attacks in the security metadata cache. Additionally, the proposed scheme combines the parity bits inside the integrity tree structure to reduce the memory accesses in case of errors.…”
Section: Related Workmentioning
confidence: 99%
“…While the lowest level counters are used to encrypt the data, the intermediate node's counters are typically referred to as versions, and are not associated with the data. Whenever a data cache line is written back to the memory, the associated encryption counter is incremented, which leads to incrementing the version in the encryption counter's parent, and updating the encryption counter's MAC [11,19,22,43,46,47,58]. Note that the update is propagated until the root is updated.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to previous security and reliability co-designs [2]- [4], our secure memory system is built on the 9-chips ECC-DIMM. We re-purpose the 9th chip (ECC chip) to store the different types of metadata other than just ECC.…”
Section: Low Overhead Integrity Verification a Re-purposing Of Ecc Chipmentioning
confidence: 99%
“…Reliability requires that memory natural failures are detectable and correctable. Nowadays, many security and reliability co-design researches [1]- [4] have achieved a good balance on performance, security, and reliability. However, these researches merely rely on encryption to ensure data confidentiality, which has been proven unable to stop information leakage from memory access patterns.…”
Section: Introductionmentioning
confidence: 99%