Caches and hash trees for efficient memory integrity verification

We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Gassend, B., Suh, G.E., Clarke, D., van Dijk, M., Devadas, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 306
container_issue
container_start_page 295
container_title
container_volume
creator Gassend, B.
Suh, G.E.
Clarke, D.
van Dijk, M.
Devadas, S.
description We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.
doi_str_mv 10.1109/HPCA.2003.1183547
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1183547</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1183547</ieee_id><sourcerecordid>1183547</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ccbc8efdc4346cdff35e6eeba8d759b17bb04bd82f64f3d4584899bbce63d4be3</originalsourceid><addsrcrecordid>eNotkMtKxDAYhYMXsIx9AHGTF-iYNEmTLEtRZ2BAFwruhlz-2IhtJQ3CvL0B52wOHx-cxUHojpItpUQ_7F6HftsSwgoqJri8QFXLpGpawj4uUa2lIrLTgipJ1RWqqGCkIUrLG1Sv6xcpYcUSWqF-MG6EFZvZ49GsI84JCoYlYQghughzxhNMSzrhOGf4TDGf8C-kWKTJcZlv0XUw3yvU596g96fHt2HXHF6e90N_aCKVIjfOWacgeMcZ75wPgQnoAKxRXgptqbSWcOtVGzoemOdCcaW1tQ66QhbYBt3_70YAOP6kOJl0Op4PYH-ZGE50</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Caches and hash trees for efficient memory integrity verification</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Gassend, B. ; Suh, G.E. ; Clarke, D. ; van Dijk, M. ; Devadas, S.</creator><creatorcontrib>Gassend, B. ; Suh, G.E. ; Clarke, D. ; van Dijk, M. ; Devadas, S.</creatorcontrib><description>We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.</description><identifier>ISSN: 1530-0897</identifier><identifier>ISBN: 9780769518718</identifier><identifier>ISBN: 0769518710</identifier><identifier>EISSN: 2378-203X</identifier><identifier>DOI: 10.1109/HPCA.2003.1183547</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Bandwidth ; Computer science ; Coprocessors ; Costs ; Hardware ; Laboratories ; Machinery ; Protection ; Security</subject><ispartof>The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings, 2003, p.295-306</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1183547$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1183547$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gassend, B.</creatorcontrib><creatorcontrib>Suh, G.E.</creatorcontrib><creatorcontrib>Clarke, D.</creatorcontrib><creatorcontrib>van Dijk, M.</creatorcontrib><creatorcontrib>Devadas, S.</creatorcontrib><title>Caches and hash trees for efficient memory integrity verification</title><title>The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings</title><addtitle>HPCA</addtitle><description>We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.</description><subject>Application software</subject><subject>Bandwidth</subject><subject>Computer science</subject><subject>Coprocessors</subject><subject>Costs</subject><subject>Hardware</subject><subject>Laboratories</subject><subject>Machinery</subject><subject>Protection</subject><subject>Security</subject><issn>1530-0897</issn><issn>2378-203X</issn><isbn>9780769518718</isbn><isbn>0769518710</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkMtKxDAYhYMXsIx9AHGTF-iYNEmTLEtRZ2BAFwruhlz-2IhtJQ3CvL0B52wOHx-cxUHojpItpUQ_7F6HftsSwgoqJri8QFXLpGpawj4uUa2lIrLTgipJ1RWqqGCkIUrLG1Sv6xcpYcUSWqF-MG6EFZvZ49GsI84JCoYlYQghughzxhNMSzrhOGf4TDGf8C-kWKTJcZlv0XUw3yvU596g96fHt2HXHF6e90N_aCKVIjfOWacgeMcZ75wPgQnoAKxRXgptqbSWcOtVGzoemOdCcaW1tQ66QhbYBt3_70YAOP6kOJl0Op4PYH-ZGE50</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Gassend, B.</creator><creator>Suh, G.E.</creator><creator>Clarke, D.</creator><creator>van Dijk, M.</creator><creator>Devadas, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Caches and hash trees for efficient memory integrity verification</title><author>Gassend, B. ; Suh, G.E. ; Clarke, D. ; van Dijk, M. ; Devadas, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ccbc8efdc4346cdff35e6eeba8d759b17bb04bd82f64f3d4584899bbce63d4be3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Application software</topic><topic>Bandwidth</topic><topic>Computer science</topic><topic>Coprocessors</topic><topic>Costs</topic><topic>Hardware</topic><topic>Laboratories</topic><topic>Machinery</topic><topic>Protection</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Gassend, B.</creatorcontrib><creatorcontrib>Suh, G.E.</creatorcontrib><creatorcontrib>Clarke, D.</creatorcontrib><creatorcontrib>van Dijk, M.</creatorcontrib><creatorcontrib>Devadas, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gassend, B.</au><au>Suh, G.E.</au><au>Clarke, D.</au><au>van Dijk, M.</au><au>Devadas, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Caches and hash trees for efficient memory integrity verification</atitle><btitle>The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings</btitle><stitle>HPCA</stitle><date>2003</date><risdate>2003</risdate><spage>295</spage><epage>306</epage><pages>295-306</pages><issn>1530-0897</issn><eissn>2378-203X</eissn><isbn>9780769518718</isbn><isbn>0769518710</isbn><abstract>We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.</abstract><pub>IEEE</pub><doi>10.1109/HPCA.2003.1183547</doi><tpages>12</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1530-0897
ispartof The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings, 2003, p.295-306
issn 1530-0897
2378-203X
language eng
recordid cdi_ieee_primary_1183547
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Application software
Bandwidth
Computer science
Coprocessors
Costs
Hardware
Laboratories
Machinery
Protection
Security
title Caches and hash trees for efficient memory integrity verification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T01%3A43%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Caches%20and%20hash%20trees%20for%20efficient%20memory%20integrity%20verification&rft.btitle=The%20Ninth%20International%20Symposium%20on%20High-Performance%20Computer%20Architecture,%202003.%20HPCA-9%202003.%20Proceedings&rft.au=Gassend,%20B.&rft.date=2003&rft.spage=295&rft.epage=306&rft.pages=295-306&rft.issn=1530-0897&rft.eissn=2378-203X&rft.isbn=9780769518718&rft.isbn_list=0769518710&rft_id=info:doi/10.1109/HPCA.2003.1183547&rft_dat=%3Cieee_6IE%3E1183547%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1183547&rfr_iscdi=true