A Low-Cost Memory Remapping Scheme for Address Bus Protection

The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to leakage of proprietary algorithms or critical information such as encryption keys. Addresses can be observed by side-channel attacks mounted on remote servers that run sensitive programs but are not under the physical control of the client. Two previously proposed hardware techniques tackled this problem through randomizing address patterns on the bus. In this paper, the authors examine these attempts and show that they impose great pressure on both the memory and the disk.

Provided by: Reed Business Information Topic: Data Centers Date Added: Feb 2010 Format: PDF

Download Now

Find By Topic