EconPapers    
Economics at your fingertips  
 

Memory protection challenges: Attacks on memory encryption

Rodrigo Rubira Branco and Shay Gueron

Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 3, 199-206

Abstract: This paper explains some of the challenges involved in protecting the system memory of a computing platform against adversaries who can read and modify its contents. To clarify the limitations and effectiveness of different defence mechanisms, we lay out a threat model, coupled with a set of assumptions on the adversarial capabilities, for a variety of scenarios. Finally, we explain the mechanics of some attacks on encrypted memory, to illustrate why relying on encryption alone is risky in reality. The paper is addressed to individuals and organisations with a need to consider physical attacks as part of their threat scope and to companies considering solutions to isolate system administrators from customer data in virtualised environments.

Keywords: memory encryption; data-only exploits; hardware attacks; TOCTOU race condition (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/4827/download/ (application/pdf)
https://hstalks.com/article/4827/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:3:p:199-206

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2017:v:1:i:3:p:199-206