Dong et al., 2024 - Google Patents
Toleo: Scaling freshness to tera-scale memory using CXL and PIMDong et al., 2024
View PDF- Document ID
- 16016745600904097038
- Author
- Dong J
- Rosenblum J
- Narayanasamy S
- Publication year
- Publication venue
- Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4
External Links
Snippet
Trusted hardware's freshness guarantee ensures that an adversary cannot replay an old value in response to a memory read request. They rely on maintaining a version number for each cache block and ensuring their integrity using a Merkle tree. However, these existing …
- 230000015654 memory 0 title abstract description 215
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/0802—Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3758287B1 (en) | Deterministic encryption key rotation | |
| Ren et al. | Design space exploration and optimization of path oblivious RAM in secure processors | |
| US10097349B2 (en) | Systems and methods for protecting symmetric encryption keys | |
| US9141558B2 (en) | Secure memory control parameters in table look aside buffer data fields and support memory array | |
| Maas et al. | Phantom: Practical oblivious computation in a secure processor | |
| US11775177B2 (en) | Integrity tree for memory integrity checking | |
| Ren et al. | Design and implementation of the ascend secure processor | |
| Kang et al. | Iceclave: A trusted execution environment for in-storage computing | |
| Shafiee et al. | Secure DIMM: Moving ORAM primitives closer to memory | |
| US11216592B2 (en) | Dynamic cryptographic key expansion | |
| Wang et al. | D-oram: Path-oram delegation for low execution interference on cloud servers with untrusted memory | |
| JP2008123513A (en) | Trusted device which has virtual register | |
| Elbaz et al. | A parallelized way to provide data encryption and integrity checking on a processor-memory bus | |
| Swami et al. | ACME: Advanced counter mode encryption for secure non-volatile memories | |
| Dong et al. | Toleo: Scaling freshness to tera-scale memory using CXL and PIM | |
| Yuan et al. | Pssm: Achieving secure memory for gpus with partitioned and sectored security metadata | |
| Cao et al. | Streamline ring oram accesses through spatial and temporal optimization | |
| Yudha et al. | LITE: a low-cost practical inter-operable GPU TEE | |
| Canpolat et al. | Breakhammer: Enhancing rowhammer mitigations by carefully throttling suspect threads | |
| Han et al. | Dolos: Improving the performance of persistent applications in adr-supported secure memory | |
| Feng et al. | siopmp: Scalable and efficient i/o protection for tees | |
| Choi et al. | ShieldCXL: A practical obliviousness support with sealed CXL memory | |
| Umar et al. | Softvn: Efficient memory protection via software-provided version numbers | |
| Li et al. | Efficient Security Support for CXL Memory through Adaptive Incremental Offloaded (Re-) Encryption | |
| Lipp | Cache attacks on arm |