Memory sensitive data encryption protection system based on hardware tag

A sensitive data and protection system technology, applied in the field of information security, can solve problems such as weak scalability, insufficient performance, and large errors in selective sensitive data protection technology, and achieve the effect of ensuring confidentiality and preventing theft

Pending Publication Date: 2021-06-04
ZHEJIANG UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problems of large error, weak scalability and insufficient performance of the existing selective sensitive data protection technology, the present invention provides a memory sensitive data encryption protection system based on hardware tags, and the specific technical scheme is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory sensitive data encryption protection system based on hardware tag
  • Memory sensitive data encryption protection system based on hardware tag
  • Memory sensitive data encryption protection system based on hardware tag

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments, and the purpose and effect of the present invention will become clearer. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention.

[0020] The hardware tag-based memory sensitive data encryption protection system of the present invention includes a hardware tag architecture, a hardware encryption module and a system support module.

[0021] Among them, the hardware tag architecture is used to complete fine-grained dynamic information flow tracking of sensitive data objects at runtime, and distinguish sensitive data objects from a large number of ordinary data objects through the transfer of tags in memory and registers, thereby selectively Protect sensitive data in memory;

[0022] The hardware encryption module connects the on-chip L1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a memory sensitive data encryption protection system based on a hardware tag. The system comprises a hardware tag architecture, a hardware encryption module and a system support module. The hardware tag architecture dynamically tracks sensitive data through a tag instruction and a tag clear instruction; additionally expanding tag storage in an on-chip cache or a register, and modifying an assembly line to allow tags to be propagated from an affiliated source register to a target register in processor operation; a label cache is constructed between the off-chip cache and the off-chip memory and used for reducing the load overhead when data and labels need to be taken from the off-chip memory; the hardware encryption module encrypts and decrypts sensitive data entering and exiting the chip; and the system support module provides support for the hardware tag architecture and the hardware encryption module. The system disclosed by the invention can efficiently protect sensitive data in a program memory from being leaked in a fine-grained and high-robustness manner.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a memory sensitive data encryption protection system based on hardware tags. Background technique [0002] In recent years, with the popularity of computing devices, sensitive data leakage attacks have become rampant. Traditional means of defending against control flow hijacking attacks such as stack cookie, DEP, and address space randomization cannot defend against leaking attacks based on data flow alone. Steal keys and cause great harm. [0003] The performance penalty when running Dataflow Integrity Protection is prohibitive, making it difficult to deploy. For this reason, a selective data protection (selective data protection) strategy proposes that only important data objects in memory can be protected instead of all data objects. Some new systems implement this strategy by requiring developers to flag sensitive variables and statically analyze a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/78
CPCG06F21/602G06F21/78
Inventor 周亚金马麟徐金焱申文博孙家栋常瑞任奎
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products