Abstracts

 
 
 
 
 
 
 
 
 
 
 

  An overview of Cryptographic Techniques for Memory Authentication

  R. Elbaz, D. Champagne

 
An important objective in the design of a secure processor chip is to ensure memory used by software executing on the chip cannot be stealthily corrupted by a malicious party. An adversary tampering with the physical memory space can disrupt the normal execution flow of applications or the operating system running on the executing platform. Secure processors must thus implement memory authentication mechanisms that verify the integrity of data and code the processor stores to and fetches from main memory. In this presentation we give an overview of existing cryptographic techniques using integrity trees (Merkle Hash Tree, Parallelizable Authentication Tree (PAT) and Tamper-Evident Counter Tree (TEC-Tree)) to provide memory authentication.