Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques 2006
DOI: 10.1145/1152154.1152170
|View full text |Cite
|
Sign up to set email alerts
|

Efficient data protection for distributed shared memory multiprocessors

Abstract: Data security in computer systems has recently become an increasing concern, and hardware-based attacks have emerged. As a result, researchers have investigated hardware encryption and authentication mechanisms as a means of addressing this security concern. Unfortunately, no such techniques have been investigated for Distributed Shared Memory (DSM) multiprocessors, and previously proposed techniques for uni-processor and Symmetric Multiprocessor (SMP) systems cannot be directly used for DSMs. This work is the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
35
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(36 citation statements)
references
References 19 publications
1
35
0
Order By: Relevance
“…These operating systems require that the memory architecture defend against offline physical attacks and avoid run-time processor stalls-a unique combination of feature and performance that no memory system has previously achieved. Furthermore, the architecture must support all legacy software and hardware interfaces, including DMA and multiprocessors [24,29], and do so within a modest component footprint. We explore how these features are simultaneously achieved within our MECU-enhanced architecture in the following sections.…”
Section: Secure Memory Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…These operating systems require that the memory architecture defend against offline physical attacks and avoid run-time processor stalls-a unique combination of feature and performance that no memory system has previously achieved. Furthermore, the architecture must support all legacy software and hardware interfaces, including DMA and multiprocessors [24,29], and do so within a modest component footprint. We explore how these features are simultaneously achieved within our MECU-enhanced architecture in the following sections.…”
Section: Secure Memory Systemsmentioning
confidence: 99%
“…Proposals include hashing over cache lines and storing values in separate or statically-allocted memory [18], creating a Merkle hash tree of memory segments and caching the results [13,31], and using GCM encryption to simultaneously encrypt and hash memory blocks [24]. Adapting these solutions to our architecture requires a careful analysis of the performance 5 Embedded systems with a 10 MHz clock traditionally have a 16-bit address space.…”
Section: Main Memory Integritymentioning
confidence: 99%
“…Rogers, et al pointed out the limitation of above schemes on DSM systems and proposed an efficient data protection design [21]. By focusing on point-to-point communications of the directory-based cache coherence protocol, they were able to utilize DSM systems' temporal locality of communications, which means a processor communicates with a relatively small Please note that in multiprocessor shared-memory protection, all processors and related components like the memory controller are assumed to share the same secret key.…”
Section: Multiprocessor Secure Modelmentioning
confidence: 99%
“…A recent study by Rogers, et al proposed a novel mechanism for protecting cache-to-cache communication in distributed shared memory (DSM) multiprocessors as a remedy for this problem [21]. However, since their design focused on the directory-based cache coherence protocol used for the point-to-point communication, their idea cannot be directly applied to the systems with other cache coherence protocols used for multicasting/broadcasting communication such as the token coherence protocol [2,16].…”
Section: Introductionmentioning
confidence: 99%
“…It ensures confidentiality with encryption and ensures integrity with Merkle trees [4], [6], [10], [38]. Security adds overheads, motivating performance optimizations that cache metadata and speculate around safeguards [11], [26], [27], [33], [34], [37], [49]. We survey recent progress to motivate our solution, PoisonIvy, which builds atop best practices to address remaining performance challenges.…”
Section: Introductionmentioning
confidence: 99%