DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seol, Hoseok | ko |
dc.contributor.author | Kim, Minhye | ko |
dc.contributor.author | Kim, Taesoo | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.contributor.author | Kim, Lee-Sup | ko |
dc.date.accessioned | 2021-03-23T05:30:06Z | - |
dc.date.available | 2021-03-23T05:30:06Z | - |
dc.date.created | 2019-11-21 | - |
dc.date.created | 2019-11-21 | - |
dc.date.created | 2019-11-21 | - |
dc.date.issued | 2021-04 | - |
dc.identifier.citation | IEEE TRANSACTIONS ON COMPUTERS, v.70, no.4, pp.539 - 551 | - |
dc.identifier.issn | 0018-9340 | - |
dc.identifier.uri | http://hdl.handle.net/10203/281804 | - |
dc.description.abstract | DRAMs in modern computers or hand-held devices store private or often security-sensitive data. Unfortunately, one known attack vector, called a cold boot attack, remains threatening and easy-to-exploit, especially when attackers have physical access to the device. It exploits the fundamental property of current DRAMs: remanence effects that retain the stored contents for a certain period of time even after powering off. To magnify the remanence effect, cold boot attacks typically freeze the victim DRAM, thereby providing a chance to detach, move, and reattach it to an attacker's computer. Once power is on, attackers can steal all the security-critical information from the victim's DRAM, such as a master decryption key for an encrypted disk storage. Two types of defenses were proposed in the past: 1) CPU-bound cryptography, where keys are stored in CPU registers and caches instead of in DRAMs, and 2) full or partial memory encryption, where sensitive data are stored encrypted. However, both methods impose non-negligible performance or energy overheads to the running systems, and worse, significantly increase the hardware and software manufacturing costs. We found that these proposed solutions attempted to address the cold boot attacks passively: either by avoiding or by indirectly addressing the root cause of the problem, the remanence effect. In this paper, we propose and evaluate a proactive defense mechanism, Amnesiac DRAM, that comprehensively prevents the cold boot attacks. The key idea is to discard the contents in the DRAM when attackers attempt to retrieve (i.e., power on) them from the stolen DRAM. When Amnesiac DRAM senses a physical separation, it locks itself and deletes all the remaining contents, making it amnesiac. The Amnesiac DRAM causes neither performance nor energy overhead in ordinary operations (e.g., load and store) and can be easily implemented with negligible area overhead in commodity DRAM architectures. | - |
dc.language | English | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks | - |
dc.type | Article | - |
dc.identifier.wosid | 000631200400004 | - |
dc.identifier.scopusid | 2-s2.0-85103139730 | - |
dc.type.rims | ART | - |
dc.citation.volume | 70 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 539 | - |
dc.citation.endingpage | 551 | - |
dc.citation.publicationname | IEEE TRANSACTIONS ON COMPUTERS | - |
dc.identifier.doi | 10.1109/TC.2019.2946365 | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.localauthor | Kim, Lee-Sup | - |
dc.contributor.nonIdAuthor | Seol, Hoseok | - |
dc.contributor.nonIdAuthor | Kim, Minhye | - |
dc.contributor.nonIdAuthor | Kim, Taesoo | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Remanence | - |
dc.subject.keywordAuthor | Pins | - |
dc.subject.keywordAuthor | Encryption | - |
dc.subject.keywordAuthor | DRAM chips | - |
dc.subject.keywordAuthor | Capacitors | - |
dc.subject.keywordAuthor | Cold boot attack | - |
dc.subject.keywordAuthor | DRAM | - |
dc.subject.keywordAuthor | hardware defense | - |
dc.subject.keywordAuthor | self erasing memory | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.