Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Memory Integrity Protection Method Based on Write Counter

A technology of integrity protection and counter, applied in the direction of digital data protection, etc., can solve the problems of large time delay and long verification path of tree mechanism, and achieve the effect of low verification overhead

Active Publication Date: 2017-11-21
HARBIN ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantage of the tree mechanism is that the verification path is long and the delay in hash calculation is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Memory Integrity Protection Method Based on Write Counter
  • A Memory Integrity Protection Method Based on Write Counter
  • A Memory Integrity Protection Method Based on Write Counter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the drawings.

[0029] The invention relates to the field of memory integrity verification, in particular to a memory integrity protection method based on a write counter. Currently, tree structures are mainly used in terms of memory integrity, such as Merkle Tree, PAT, and TEC-Tree to protect memory. When data is updated, it is necessary to recurse from the leaf node to the root node, and the delay is very large. The present invention adopts different integrity verification mechanisms for the data on the memory. One type of data block has a write counter, which is used to record the number of times the processor writes to the memory block at this address. When writing data, the memory block address, write counter and data content are connected and then the MAC function is calculated to obtain the corresponding authentication tag for completeness Sexual verification; some data blocks do not have a w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of memory integrity verification, in particular to a memory integrity protection method based on a write counter. According to the memory integrity protection method based on the write counter, two types of data blocks are provided, the corresponding write counter is provided for one type of data blocks and is used for recording the number of writing times of a processor to an address memory block, the write counter is stored in a specific write counter cache in a processor chip, and the write counter cache is located on the same level as an L2 cache; and in the write counter cache, a private key is also assigned for the data blocks. Compared to adoption of a hash check tree, adoption of a message verification code for performing integrity verification has the largest advantage of much lower verification cost. When the integrity verification is performed by using the hash check tree, iteration needs to be carried out from a leaf node to a root node to calculate a hash value; but for the message verification code, MAC calculation only needs to be carried out for once, i.e. only one layer of operations in the hash tree needs to be performed.

Description

Technical field [0001] The invention relates to the field of memory integrity verification, in particular to a memory integrity protection method based on a write counter. technical background [0002] With the development of science and technology, the application of computers has become more and more popular, and many computers will process a lot of confidential information. Therefore, how to ensure the security of these data has become a hot topic of current research. Integrity protection is to ensure that malicious tampering of data by an attacker, such as a hardware piggyback attack, can be detected. Attackers can deceive, reorganize, and replay the data flowing on the bus. The focus of protection is to resist replay attacks. Replay attack means that the attacker replaces the data previously stored in a certain address unit with the current data. At present, the prevention of replay attacks is mainly through the use of a tree verification mechanism. According to the diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 张国印郭振华姚念民石翠华吴艳霞
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products