An efficient run-time encryption scheme for non-volatile main memory

X Zhang, C Zhang, G Sun, J Di… - … conference on compilers …, 2013 - ieeexplore.ieee.org
2013 International conference on compilers, architecture and …, 2013ieeexplore.ieee.org
Emerging non-volatile memories (NVMs) have been considered as promising alternatives of
DRAM for future main memory design. The NVM main memory has advantages of low
standby power, high density, and good scalability. Its non-volatility, however, induces a
security design challenge that data retained in memory after power-off need to be protected
from malicious attacks. Although several approaches have been proposed to solve this
problem through data encryption, they have some limitations such as high design complexity …
Emerging non-volatile memories (NVMs) have been considered as promising alternatives of DRAM for future main memory design. The NVM main memory has advantages of low standby power, high density, and good scalability. Its non-volatility, however, induces a security design challenge that data retained in memory after power-off need to be protected from malicious attacks. Although several approaches have been proposed to solve this problem through data encryption, they have some limitations such as high design complexity and non-trivial timing/energy overhead. Moreover, these techniques decrease the lifetime of NVM main memory due to extra write operations caused by encryption. In order to overcome these limitations, we propose an efficient PAD-XOR based encryption scheme in this work. A novel PAD generator based on a randomizer and several sub-PAD tables is introduced. With the PAD generator, our encryption scheme can provide run-time data protection to all data in NVM memory with low timing and power overhead. In addition, the encryption process can co-operate with wear-leveling of NVM to reduce design complexity. More important, our encryption technique has no impact on lifetime because no extra writes are incurred. Experimental results demonstrate that, compared to prior approaches, our design can achieve the same security strength with substantial lower overhead in respect of timing, energy consumption, and design complexity.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果