[go: up one dir, main page]

Dong et al., 2024 - Google Patents

Toleo: Scaling freshness to tera-scale memory using CXL and PIM

Dong et al., 2024

View PDF
Document ID
16016745600904097038
Author
Dong J
Rosenblum J
Narayanasamy S
Publication year
Publication venue
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4

External Links

Snippet

Trusted hardware's freshness guarantee ensures that an adversary cannot replay an old value in response to a memory read request. They rely on maintaining a version number for each cache block and ensuring their integrity using a Merkle tree. However, these existing …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
EP3758287B1 (en) Deterministic encryption key rotation
Ren et al. Design space exploration and optimization of path oblivious RAM in secure processors
US10097349B2 (en) Systems and methods for protecting symmetric encryption keys
US9141558B2 (en) Secure memory control parameters in table look aside buffer data fields and support memory array
Maas et al. Phantom: Practical oblivious computation in a secure processor
US11775177B2 (en) Integrity tree for memory integrity checking
Ren et al. Design and implementation of the ascend secure processor
Kang et al. Iceclave: A trusted execution environment for in-storage computing
Shafiee et al. Secure DIMM: Moving ORAM primitives closer to memory
US11216592B2 (en) Dynamic cryptographic key expansion
Wang et al. D-oram: Path-oram delegation for low execution interference on cloud servers with untrusted memory
JP2008123513A (en) Trusted device which has virtual register
Elbaz et al. A parallelized way to provide data encryption and integrity checking on a processor-memory bus
Swami et al. ACME: Advanced counter mode encryption for secure non-volatile memories
Dong et al. Toleo: Scaling freshness to tera-scale memory using CXL and PIM
Yuan et al. Pssm: Achieving secure memory for gpus with partitioned and sectored security metadata
Cao et al. Streamline ring oram accesses through spatial and temporal optimization
Yudha et al. LITE: a low-cost practical inter-operable GPU TEE
Canpolat et al. Breakhammer: Enhancing rowhammer mitigations by carefully throttling suspect threads
Han et al. Dolos: Improving the performance of persistent applications in adr-supported secure memory
Feng et al. siopmp: Scalable and efficient i/o protection for tees
Choi et al. ShieldCXL: A practical obliviousness support with sealed CXL memory
Umar et al. Softvn: Efficient memory protection via software-provided version numbers
Li et al. Efficient Security Support for CXL Memory through Adaptive Incremental Offloaded (Re-) Encryption
Lipp Cache attacks on arm