The security goals of cloud providers and users include memory confidentiality and integrity, which requires implementing Replay-Attack protection (RAP). RAP can be achieved using integrity trees or mutually authenticated channels. Integrity trees incur significant performance overheads and are impractical for protecting large memories. Mutually authenticated channels have been proposed only for packetized memory interfaces that address only a very small niche domain and require fundamental changes to memory system architecture. We propose SecDDR, a low-cost RAP that targets direct-attached memories, like DDRx. SecDDR avoids memory-side data authentication, and thus, only adds a small amount of logic to memory components and does not change the underlying DDR protocol, making it practical for widespread adoption. In contrast to prior mutual authentication proposals, which require trusting the entire memory module, SecDDR targets untrusted modules by placing its limited security logic on the DRAM die (or package) of the ECC chip. Our evaluation shows that SecDDR performs within 1% of an encryption-only memory without RAP and that SecDDR provides 18.8% and 7.8% average performance improvements (up to 190.4% and 24.8%) relative to a 64-ary integrity tree and an authenticated channel, respectively.
翻译:云端提供者和用户的安全目标包括记忆保密性和完整性,这要求执行Replay-Attack保护(RAP) 。 RAP可以使用完整性树或相互认证的渠道实现。 完整树产生大量的性能管理费用,对保护大记忆不切实际。 相互认证的渠道只针对只涉及非常小的利基域并需要对记忆系统结构进行根本改变的封装记忆接口; 我们建议SecDDDDDDD(或套件),即针对直接连接的记忆的低成本的SecDDRAD(或套件)的SecDECD(或套件)的SecDDDDDDDDDDDDDDDDDDDD(或套件)系统。 我们的评估表明,SecDDDD在不使用RAP(RAP)系统的情况下,在1%的加密专用记忆内进行检查,因此SecDDDDD只提供18.8%和7.8%的平均绩效改进(分别达到190.4%和24.8 %), 相对于一个审校正和64-ADRIM(r)系统。