Affiliation:
1. Sandia National Laboratories
2. North Carolina State University
3. National Science Foundation
Abstract
Trustworthy software requires strong privacy and security guarantees from a secure trust base in hardware. While chipmakers provide hardware support for basic security and privacy primitives such as enclaves and memory encryption. these primitives do not address hiding of the memory access pattern, information about which may enable attacks on the system or reveal characteristics of sensitive user data. State-of-the-art approaches to protecting the access pattern are largely based on Oblivious RAM (ORAM). Unfortunately, current ORAM implementations suffer from very significant practicality and overhead concerns, including roughly an order of magnitude slowdown, more than 100% memory capacity overheads, and the potential for system deadlock.
Memory technology trends are moving towards 3D and 2.5D integration, enabling significant logic capabilities and sophisticated memory interfaces. Leveraging the trends, we propose a new approach to access pattern obfuscation, called ObfusMem. ObfusMem adds the memory to the trusted computing base and incorporates cryptographic engines within the memory. ObfusMem encrypts commands and addresses on the memory bus, hence the access pattern is cryptographically obfuscated from external observers. Our evaluation shows that ObfusMem incurs an overhead of 10.9% on average, which is about an order of magnitude faster than ORAM implementations. Furthermore, ObfusMem does not incur capacity overheads and does not amplify writes. We analyze and compare the security protections provided by ObfusMem and ORAM, and highlight their differences.
Publisher
Association for Computing Machinery (ACM)
Reference54 articles.
1. 2011. HMC Consortium. http://www.hybridmemorycube.org/technology.html. (2011). 2011. HMC Consortium. http://www.hybridmemorycube.org/technology.html. (2011).
2. 2014. 4RCD0124K DDR4 http://www.idt.com/. (2014). 2014. 4RCD0124K DDR4 http://www.idt.com/. (2014).
3. 2014. CAB4A DDR4 http://www.ti.com/lit/ds/symlink/cab4a.pdf. (2014). 2014. CAB4A DDR4 http://www.ti.com/lit/ds/symlink/cab4a.pdf. (2014).
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A survey on techniques for improving Phase Change Memory (PCM) lifetime;Journal of Systems Architecture;2023-11
2. LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables;Proceedings of the 50th Annual International Symposium on Computer Architecture;2023-06-17
3. Dolos: Improving the Performance of Persistent Applications in ADR-Supported Secure Memory;MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture;2021-10-17
4. A survey on attack vectors in stack cache memory;Integration;2020-05
5. SuperMem;Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture;2019-10-12