[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1815961.1816015acmconferencesArticle/Chapter ViewAbstractPublication PagesiscaConference Proceedingsconference-collections
research-article

IVEC: off-chip memory integrity protection for both security and reliability

Published: 19 June 2010 Publication History

Abstract

This paper proposes a unified off-chip memory integrity protection scheme, named IVEC. Today, a system needs two independent mechanisms in order to protect the memory integrity from both physical attacks and random errors. Integrity verification schemes detect malicious tampering of memory while error correcting codes (ECC) detect and correct random errors. IVEC enables both detection of malicious attacks for security and correction of random errors for reliability at the same time by extending the integrity verification techniques. Analytical and experimental studies show that IVEC can correct single-bit errors and even multi-bit errors from one DRAM chip within a cache block read without any additional ECC bits, when the integrity verification is also required for security, effectively removing the memory and bandwidth overheads (12.5%) of typical ECC schemes. Alternatively, with parity bits, IVEC can provide even stronger error correction capabilities comparable to the traditional chip-kill correct, still with less overheads. For both cases, IVEC can use standard non-ECC DIMMs.

References

[1]
AMD. BIOS and kernel developer's guide for AMD NPT family 0Fh processors, July 2007. http://support.amd.com/us/Processor_TechDocs/32559.pdf.
[2]
E. R. Berlekamp. Algebraic Coding Theory, Revised Edition. 1984.
[3]
C. L. Chen. Error-correcting codes with byte error-detection capability. IEEE Trans. Comput., 32(7):615--621, 1983.
[4]
CNNMoney.com. IBM launches new security technology, 2006. http://money.cnn.com/2006/04/10/technology/IBM_security/.
[5]
T. J. Dell. A white paper on the benefits of chipkill-correct ECC for PC server main memory. IBM Microelectronics, 1997.
[6]
A. Dutta and N. A. Touba. Multiple bit upset tolerant memory using a selective cycle avoidance based SEC-DED-DAEC code. VLSI Test Symposium, IEEE, 2007.
[7]
M. Dworkin. Recommendation for block cipher modes of operation: Galois/counter mode(GCM) and GMAC, November 2007.
[8]
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and merkle trees for efficient memory integrity verification. In Proceedings of 9th International Symposium on High Performance Computer Architecture (HPCA), 2003.
[9]
M. Hamada and E. Fujiwara. A class of error control codes for byte organized memory systems-sbec-(sb+s)ed codes-. IEEE Trans. Comput., 46(1):105--109, 1997.
[10]
R. W. Hamming. Error detecting and correcting codes. Bell Systems Technical Journal, 29(2):147--163, 1950.
[11]
J. L. Henning. SPEC CPU2000: Measuring CPU performance in the new millennium. IEEE Computer, July 2000.
[12]
M. Y. Hsiao. A class of optimal minumum odd-weightcolumn SEC-DED codes. IBM Journal of Research and Developement, 14(4):395--401, 1970.
[13]
A. Huang. Keeping secrets in hardware: The microsoft XboxTM case study. In CHES, volume 2523 of Lecture Notes in Computer Science, 2002.
[14]
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104: HMAC: Keyed-Hashing for Message Authentication, Feb. 1997.
[15]
P. K. Lala. An adaptive double error corrrection scheme for semiconductor memory systems. Digital Processes, 4, 1978.
[16]
L. Li, V. Degalahal, N. Vijaykrishnan, M. Kandemir, and M. Irwini. Soft error and energy consumption interactions: A data cache perspective. Proceedings of International Symposium on Low Power Electronics and Design (ISLPED), August 2004.
[17]
D. Locklear. Chipkill correct memory architecture. Dell Enterprise Systems Group technology brief, August 2000.
[18]
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 Conference on Programming Language Design and Implementation International (PLDI), June 2005.
[19]
J. Maiz, S. Hareland, K. Zhang, and P. Armstrong. Characterization of multi-bit soft error events in advanced SRAMs. In IEEE International Electron Devices Meeting, 2003.
[20]
R. C. Merkle. Protocols for public key cryptography. In IEEE Symposium on Security and Privacy, 1980.
[21]
N. Nakka, Z. Kalbarczyk, R. K. Iyer, and J. Xu. An architectural framework for providing reliability and security support. In Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN), 2004.
[22]
R. Naseer and J. Draper. Parallel double error correcting code design to mitigate multi-bit upsets in SRAMs. Solid-State Circuits Conference, 2008.
[23]
NIST. FIPS PUB 180-1: Secure Hash Standard, April 1995.
[24]
NIST. FIPS PUB 180-2: Secure Hash Standard, August 2002.
[25]
K. Osada, K. Yamaguchi, Y. Saitoh, and T. Kawahara. SRAM immunity to cosmic-ray-induced multierrors based on analysis of an induced parasitic bipolar effect. Solid-State Circuits, IEEE Journal of, 39(5):827--833, May 2004.
[26]
E. Perelman, G. Hamerly, and B. Calder. Picking statistically valid and early simulation points. In Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques (PACT), 2003.
[27]
B. Rogers, S. Chhabra, M. Prvulovic, and Y. Solihin. Using address independent seed encryption and Bonsai merkle trees to make secure processors OSand performance-friendly. In Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture, 2007.
[28]
N. N. Sadler and D. J. Sorin. Choosing an error protection scheme for a microprocessor's L1 data cache. In Proceedings of International Conference on Computer Design (ICCD), 2006.
[29]
B. Schroeder, E. Pinheiro, and W. Weber. DRAM errors in the wild: a large-scale field study. In ACM SIGMETRICS, pages 193--204, 2009.
[30]
C. W. Slayman. Cache and memory error detection, correction, and reduction techniques for terrestrial servers and workstations. IEEE Transactions on Devices and Materials Reliability, 5(3), 2005.
[31]
Sun Microsystems Inc. OpenSPARC T2 System-On-Chip (SOC) microarchitecture specification, May 2008.
[32]
S. Vlaovic. TAXI: Trace analysis for x86 interpretation. In Proceedings of the 2002 IEEE International Conference on Computer Design, 2002.
[33]
C. Yan, D. Englender, M. Prvulovic, B. Rogers, and Y. Solihin. Improving cost, performance, and security of memory encryption and authentication. In Proceedings of the 33rd International Symposium on Computer Architecture (ISCA), June 2006.
[34]
D. Yoon and M. Erez. Memory mapped ECC: Low-cost error protection for last level caches. Proceedings of 36th International Symp Computer Architecture (ISCA), June 2009.
[35]
D. H. Yoon and M. Erez. Virtualized and flexible ecc for main memory. In Proceedings of the 15th Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2010.

Cited By

View all
  • (2024)Polymorphic Error Correction2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO)10.1109/MICRO61859.2024.00027(246-262)Online publication date: 2-Nov-2024
  • (2024)Presshammer: Rowhammer and Rowpress Without Physical Address InformationDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_24(460-479)Online publication date: 9-Jul-2024
  • (2023)HashTagProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620394(2797-2814)Online publication date: 9-Aug-2023
  • Show More Cited By

Index Terms

  1. IVEC: off-chip memory integrity protection for both security and reliability

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ISCA '10: Proceedings of the 37th annual international symposium on Computer architecture
      June 2010
      520 pages
      ISBN:9781450300537
      DOI:10.1145/1815961
      • cover image ACM SIGARCH Computer Architecture News
        ACM SIGARCH Computer Architecture News  Volume 38, Issue 3
        ISCA '10
        June 2010
        508 pages
        ISSN:0163-5964
        DOI:10.1145/1816038
        Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      • IEEE CS

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 June 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. error correction
      2. error detection
      3. fault tolerance
      4. memory systems
      5. reliability
      6. security

      Qualifiers

      • Research-article

      Conference

      ISCA '10
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 543 of 3,203 submissions, 17%

      Upcoming Conference

      ISCA '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 10 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Polymorphic Error Correction2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO)10.1109/MICRO61859.2024.00027(246-262)Online publication date: 2-Nov-2024
      • (2024)Presshammer: Rowhammer and Rowpress Without Physical Address InformationDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_24(460-479)Online publication date: 9-Jul-2024
      • (2023)HashTagProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620394(2797-2814)Online publication date: 9-Aug-2023
      • (2023)Hardware Hardened Sandbox Enclaves for Trusted Serverless ComputingACM Transactions on Architecture and Code Optimization10.1145/3632954Online publication date: 14-Nov-2023
      • (2023)CSI:Rowhammer – Cryptographic Security and Integrity against Rowhammer2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179390(1702-1718)Online publication date: May-2023
      • (2022)SafeGuard: Reducing the Security Risk from Row-Hammer via Low-Cost Integrity Protection2022 IEEE International Symposium on High-Performance Computer Architecture (HPCA)10.1109/HPCA53966.2022.00035(373-386)Online publication date: Apr-2022
      • (2020)SCPORAM: A Hardware Support Scheme for Protecting Memory Access Patterns2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom50675.2020.00131(983-990)Online publication date: Dec-2020
      • (2020)Compact leakage-free support for integrity and reliabilityProceedings of the ACM/IEEE 47th Annual International Symposium on Computer Architecture10.1109/ISCA45697.2020.00066(735-748)Online publication date: 30-May-2020
      • (2019)SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAM2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2019.00048(388-400)Online publication date: Jun-2019
      • (2018)VAULTACM SIGPLAN Notices10.1145/3296957.317715553:2(665-678)Online publication date: 19-Mar-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media