Caches and hash trees for efficient memory integrity verification
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 306 |
---|---|
container_issue | |
container_start_page | 295 |
container_title | |
container_volume | |
creator | Gassend, B. Suh, G.E. Clarke, D. van Dijk, M. Devadas, S. |
description | We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation. |
doi_str_mv | 10.1109/HPCA.2003.1183547 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1183547</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1183547</ieee_id><sourcerecordid>1183547</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-ccbc8efdc4346cdff35e6eeba8d759b17bb04bd82f64f3d4584899bbce63d4be3</originalsourceid><addsrcrecordid>eNotkMtKxDAYhYMXsIx9AHGTF-iYNEmTLEtRZ2BAFwruhlz-2IhtJQ3CvL0B52wOHx-cxUHojpItpUQ_7F6HftsSwgoqJri8QFXLpGpawj4uUa2lIrLTgipJ1RWqqGCkIUrLG1Sv6xcpYcUSWqF-MG6EFZvZ49GsI84JCoYlYQghughzxhNMSzrhOGf4TDGf8C-kWKTJcZlv0XUw3yvU596g96fHt2HXHF6e90N_aCKVIjfOWacgeMcZ75wPgQnoAKxRXgptqbSWcOtVGzoemOdCcaW1tQ66QhbYBt3_70YAOP6kOJl0Op4PYH-ZGE50</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Caches and hash trees for efficient memory integrity verification</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Gassend, B. ; Suh, G.E. ; Clarke, D. ; van Dijk, M. ; Devadas, S.</creator><creatorcontrib>Gassend, B. ; Suh, G.E. ; Clarke, D. ; van Dijk, M. ; Devadas, S.</creatorcontrib><description>We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.</description><identifier>ISSN: 1530-0897</identifier><identifier>ISBN: 9780769518718</identifier><identifier>ISBN: 0769518710</identifier><identifier>EISSN: 2378-203X</identifier><identifier>DOI: 10.1109/HPCA.2003.1183547</identifier><language>eng</language><publisher>IEEE</publisher><subject>Application software ; Bandwidth ; Computer science ; Coprocessors ; Costs ; Hardware ; Laboratories ; Machinery ; Protection ; Security</subject><ispartof>The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings, 2003, p.295-306</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1183547$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1183547$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gassend, B.</creatorcontrib><creatorcontrib>Suh, G.E.</creatorcontrib><creatorcontrib>Clarke, D.</creatorcontrib><creatorcontrib>van Dijk, M.</creatorcontrib><creatorcontrib>Devadas, S.</creatorcontrib><title>Caches and hash trees for efficient memory integrity verification</title><title>The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings</title><addtitle>HPCA</addtitle><description>We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.</description><subject>Application software</subject><subject>Bandwidth</subject><subject>Computer science</subject><subject>Coprocessors</subject><subject>Costs</subject><subject>Hardware</subject><subject>Laboratories</subject><subject>Machinery</subject><subject>Protection</subject><subject>Security</subject><issn>1530-0897</issn><issn>2378-203X</issn><isbn>9780769518718</isbn><isbn>0769518710</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkMtKxDAYhYMXsIx9AHGTF-iYNEmTLEtRZ2BAFwruhlz-2IhtJQ3CvL0B52wOHx-cxUHojpItpUQ_7F6HftsSwgoqJri8QFXLpGpawj4uUa2lIrLTgipJ1RWqqGCkIUrLG1Sv6xcpYcUSWqF-MG6EFZvZ49GsI84JCoYlYQghughzxhNMSzrhOGf4TDGf8C-kWKTJcZlv0XUw3yvU596g96fHt2HXHF6e90N_aCKVIjfOWacgeMcZ75wPgQnoAKxRXgptqbSWcOtVGzoemOdCcaW1tQ66QhbYBt3_70YAOP6kOJl0Op4PYH-ZGE50</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Gassend, B.</creator><creator>Suh, G.E.</creator><creator>Clarke, D.</creator><creator>van Dijk, M.</creator><creator>Devadas, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Caches and hash trees for efficient memory integrity verification</title><author>Gassend, B. ; Suh, G.E. ; Clarke, D. ; van Dijk, M. ; Devadas, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-ccbc8efdc4346cdff35e6eeba8d759b17bb04bd82f64f3d4584899bbce63d4be3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Application software</topic><topic>Bandwidth</topic><topic>Computer science</topic><topic>Coprocessors</topic><topic>Costs</topic><topic>Hardware</topic><topic>Laboratories</topic><topic>Machinery</topic><topic>Protection</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Gassend, B.</creatorcontrib><creatorcontrib>Suh, G.E.</creatorcontrib><creatorcontrib>Clarke, D.</creatorcontrib><creatorcontrib>van Dijk, M.</creatorcontrib><creatorcontrib>Devadas, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gassend, B.</au><au>Suh, G.E.</au><au>Clarke, D.</au><au>van Dijk, M.</au><au>Devadas, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Caches and hash trees for efficient memory integrity verification</atitle><btitle>The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings</btitle><stitle>HPCA</stitle><date>2003</date><risdate>2003</risdate><spage>295</spage><epage>306</epage><pages>295-306</pages><issn>1530-0897</issn><eissn>2378-203X</eissn><isbn>9780769518718</isbn><isbn>0769518710</isbn><abstract>We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10/spl times/ overhead of a naive implementation.</abstract><pub>IEEE</pub><doi>10.1109/HPCA.2003.1183547</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1530-0897 |
ispartof | The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings, 2003, p.295-306 |
issn | 1530-0897 2378-203X |
language | eng |
recordid | cdi_ieee_primary_1183547 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Application software Bandwidth Computer science Coprocessors Costs Hardware Laboratories Machinery Protection Security |
title | Caches and hash trees for efficient memory integrity verification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T01%3A43%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Caches%20and%20hash%20trees%20for%20efficient%20memory%20integrity%20verification&rft.btitle=The%20Ninth%20International%20Symposium%20on%20High-Performance%20Computer%20Architecture,%202003.%20HPCA-9%202003.%20Proceedings&rft.au=Gassend,%20B.&rft.date=2003&rft.spage=295&rft.epage=306&rft.pages=295-306&rft.issn=1530-0897&rft.eissn=2378-203X&rft.isbn=9780769518718&rft.isbn_list=0769518710&rft_id=info:doi/10.1109/HPCA.2003.1183547&rft_dat=%3Cieee_6IE%3E1183547%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1183547&rfr_iscdi=true |