ObfusMem
- 24 June 2017
- journal article
- conference paper
- Published by Association for Computing Machinery (ACM) in ACM SIGARCH Computer Architecture News
- Vol. 45 (2), 107-119
- https://doi.org/10.1145/3140659.3080230
Abstract
Trustworthy software requires strong privacy and security guarantees from a secure trust base in hardware. While chipmakers provide hardware support for basic security and privacy primitives such as enclaves and memory encryption. these primitives do not address hiding of the memory access pattern, information about which may enable attacks on the system or reveal characteristics of sensitive user data. State-of-the-art approaches to protecting the access pattern are largely based on Oblivious RAM (ORAM). Unfortunately, current ORAM implementations suffer from very significant practicality and overhead concerns, including roughly an order of magnitude slowdown, more than 100% memory capacity overheads, and the potential for system deadlock. Memory technology trends are moving towards 3D and 2.5D integration, enabling significant logic capabilities and sophisticated memory interfaces. Leveraging the trends, we propose a new approach to access pattern obfuscation, called ObfusMem. ObfusMem adds the memory to the trusted computing base and incorporates cryptographic engines within the memory. ObfusMem encrypts commands and addresses on the memory bus, hence the access pattern is cryptographically obfuscated from external observers. Our evaluation shows that ObfusMem incurs an overhead of 10.9% on average, which is about an order of magnitude faster than ORAM implementations. Furthermore, ObfusMem does not incur capacity overheads and does not amplify writes. We analyze and compare the security protections provided by ObfusMem and ORAM, and highlight their differences.Keywords
This publication has 31 references indexed in Scilit:
- DEUCEACM SIGARCH Computer Architecture News, 2015
- Freecursive ORAMACM SIGPLAN Notices, 2015
- CPU transparent protection of OS kernel and hypervisor integrity with programmable DRAMACM SIGARCH Computer Architecture News, 2013
- Path ORAMPublished by Association for Computing Machinery (ACM) ,2013
- Towards energy-proportional datacenter memory with mobile DRAMACM SIGARCH Computer Architecture News, 2012
- The gem5 simulatorACM SIGARCH Computer Architecture News, 2011
- Introduction to differential power analysisJournal of Cryptographic Engineering, 2011
- Architecting phase change memory as a scalable dram alternativeACM SIGARCH Computer Architecture News, 2009
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- How to construct random functionsJournal of the ACM, 1986