Show simple item record

dc.contributor.authorSuh, G. Edwarden_US
dc.contributor.authorClarke, Dwaineen_US
dc.contributor.authorGassend, Blaiseen_US
dc.contributor.authorvan Dijk, Martenen_US
dc.contributor.authorDevadas, Srinivasen_US
dc.date.accessioned2023-03-29T15:36:27Z
dc.date.available2023-03-29T15:36:27Z
dc.date.issued2002-11
dc.identifier.urihttps://hdl.handle.net/1721.1/149968
dc.description.abstractMemory integrity verification is a useful primitive when implementing secure processors that are resistant to attacks on hardware components. This paper proposes new hardware schemes to verify the integrity of untrusted external memory using a very small amount of trusted on-chip storage. Our schemes maintain incremental multiset hashes of all memory reads and writes at run-time, and can verify a {\\em sequence} of memory operations at a later time. We study the advantages and disadvantages of the two new schemes and two existing integrity checking schemes, MACs and hash trees, when implemented in hardware in a microprocessor. Simulations show that the new schemes outperform existing schemes of equivalent functionality when integrity verification is infrequent.en_US
dc.relation.ispartofseriesMIT-LCS-TR-872
dc.titleHardware Mechanisms for Memory Integrity Checkingen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record