|
|
An overview of Cryptographic Techniques for Memory Authentication
R. Elbaz, D. Champagne
|
|
An important objective in the design of a secure processor chip is to ensure memory used by software executing on
the chip cannot be stealthily corrupted by a malicious party. An adversary tampering with the physical memory
space can disrupt the normal execution flow of applications or the operating system running on the executing
platform. Secure processors must
thus implement memory authentication mechanisms that verify the integrity of data and code the processor stores
to and fetches from main memory. In this presentation we give an overview of existing cryptographic techniques
using integrity trees (Merkle Hash Tree, Parallelizable Authentication Tree (PAT) and Tamper-Evident Counter Tree
(TEC-Tree)) to provide memory authentication. |
|