Dissertation > Excellent graduate degree dissertation topics show

Research on Memory Confidentiality and Integrity Protection Technology

Author: ChengShun
Tutor: YaoNianMin; ZhangGang
School: Harbin Engineering University
Course: Computer technology
Keywords: Memory Security Confidentiality Protection Integrity Protection Counter ModeEncryption Hash Tree
CLC: TP333
Type: Master's thesis
Year: 2012
Downloads: 19
Quote: 0
Read: Download Dissertation


In most of the existing computer systems, the data is stored and transmitted in plaintextso that it is vulnerable to various attacks. As a key data carrier,the memory is particularlyimportant for secure system.To protect the off-chip memory,the basic idea is to protect itsconfidentiality and integrity. Confidentiality protection ensures the adversary cann’tunderstand the data he obtained, and integrity protection ensures that the system is able todetect the illegal tampering of data in a timely manner.In this paper, we first introduce the basic model of memory protection and three classicsystem architectures.Then we analysis the existing solutions of confidentiality protection andintegrity protection separately.By pointing the characteristics of the confidentiality andintegrity protection, we propose a new uniform protection scheme called PCIP (Parralelizedmemory Confidentiality and Integrity Protection technology)based on the PE-ICE. By addingredundant data into the protected data, we put the two parts of protection together. Comparedto the direct block encryption used in PE-ICE, we use the counter mode encryption in PCIP toachieve a greatly improve on encryption efficiency. In the same time, using redundant data toprotect the memory’s integrity also have a shorter latency than using complex hash algorithmto calculate the checksum value, finally,it makes sure that the encryption and integritychecking can be done in real-time.In order to reduce the on-chip memory overhead and make it more practical,we use twodifferent mechanisms to protect the off-chip CTR,named PCIP+BMT and PCIP_Tree. Both ofthe two methods have its own advantages and disadvantages, the former one can update thetree paralelly but serialized in check process. The latter the opposite.Finally, we use the SimpleScalar Tool to run10SPEC2K benchmark programs to test theproposed mechanisms.The result show that the PCIP method proposed in this paper is moreeffective than the PC-ICE. And the influence caused by using two tree protection mechanismsbased on the PCIP is little.

Related Dissertations

  1. The Design of Computer Forensics Model Based on Windows Log,D918.2
  2. Hard security access control Research and Implementation,TP333.35
  3. Safety -oriented cloud computing terminal key technologies,TP309
  4. Research and Design of A Novel Security SRAM Based on Rewrite Strategy,TP333
  5. Design and Implementation of a Backup System Based on Data De-Duplication,TP309.3
  6. Research and Implementation of Delegation Mechanism in Trusted Computing Platform,TP393.08
  7. Research, Design and Implementation of Self-Securing Disk,TP393.08
  8. The Performance Analysis and Simulation on Source Authentication Protocol in Multicast,TP393.08
  9. Research on Network Terminal Code Tamper-proofing Technologies,TP393.08
  10. The Research of Data Aggregation Integrity Protection Algorithm in Wireless Sensor Network,TP212.9
  11. The Security Architecture and Practical Model for Important Information System,TP393.08
  12. Research on Key Techniques of Memory System Data Confidentiality and Integrity Protection,TP309.7
  13. The Sociocultural Changes of Beijing Hutong and the Development of Tourism,C912.4
  14. Study on Safeguarding of Intangible Cultural Heritage of Ancient Villages,G122
  15. Research on Key Techniques of Locator/Identifier Separation Network,TP393.02
  16. Research on Key Technology of Botnet Detection,TP393.08
  17. Mining Closed Sequential Patterns Based on Bitmap,TP311.13
  18. Research on the Security Protection of Data Stored on Hard Disk,TP309
  19. The Study of The iSCSI Storage System’s Safety Performance,TP333
  20. An Efficient Broadcast Authentication Scheme for Wireless Sensor Networks,TP212.9;TN934

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Electronic digital computer (not a continuous role in computer ) > Memory
© 2012 www.DissertationTopic.Net  Mobile