Storage device data integrity protection method, controller thereof and system on chip

A technology of data integrity and storage device, applied in the computer field, can solve problems such as difficulty in resisting hacker attacks

Pending Publication Date: 2020-05-12
HYGON INFORMATION TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Even if some CPUs encrypt the data written into the memory, the encrypted data can still be modified through methods such as ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Storage device data integrity protection method, controller thereof and system on chip
  • Storage device data integrity protection method, controller thereof and system on chip
  • Storage device data integrity protection method, controller thereof and system on chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] As described in the background, after the CPU data is written into the storage device, there is a risk of being tampered with. refer to figure 1 A schematic structural diagram of a data processing system is shown. The data processing system 10 includes: a CPU 11 , a memory controller 12 and a memory 13 . After the data in the CPU 11 is written into the memory 13, hackers can use the RowHammer method or physical hardware attacks to tamper with the data written in the memory 13 without the knowledge of the CPU 11, thereby maliciously invading the virtual memory. machine data purposes. Among them, the RowHammer method repeatedly accesses a row of memory, which may cause bit flips in adjacent rows, that is, hackers can change the value of the bit in the memory. When running on a machine vulnerable to the RowHammer attack, the process is able to gain read and write access to all physical memory, allowing it to arbitrarily tamper with data in all physical memory.

[0083] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a storage device data integrity protection method, a controller thereof and a system on chip, and the method comprises the steps: obtaining a safety memory access main body identifier contained in a memory access request based on the received memory access request; acquiring a memory access main body key corresponding to the security memory access main body identifier as afirst key according to a corresponding relationship between the stored security memory access main body identifier and the memory access main body key; carrying out nonlinear transformation on the first secret key to obtain a secret key related to a memory access address; the method comprises the steps of receiving a request type of a memory access request; and performing corresponding memory access operation on a first storage device, performing hash operation by adopting a preset operation mode on the basis of the second key and data corresponding to the memory access request, generating corresponding message authentication data, and storing the message authentication data for performing data integrity verification when the corresponding data stored in the first storage device is read. According to the scheme, integrity protection can be provided for the data in the first storage device.

Description

technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular to a method for protecting data integrity of a storage device, a controller thereof, and a system on chip. Background technique [0002] In a computer system, after the central processing unit (Central Processing Unit, CPU) data is written into a storage device such as a memory, there is a risk of being tampered with. For example, the bits in the memory can be flipped through the RowHammer method, or the memory data can be tampered with through physical hardware attacks. In this way, the data that has been written in the memory can be tampered without the CPU knowing at all, so hackers can achieve the purpose of maliciously invading the virtual machine data. [0003] Even if some CPUs encrypt the data written into the memory, the encrypted data can still be modified through methods such as ciphertext collision attacks. Therefore, even if the memory data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14G06F21/79
CPCG06F12/1466G06F21/79Y02D10/00
Inventor 王海洋姜莹
Owner HYGON INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products