Memory protection challenges: Attacks on memory encryption
Rodrigo Rubira Branco and
Shay Gueron
Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 3, 199-206
Abstract:
This paper explains some of the challenges involved in protecting the system memory of a computing platform against adversaries who can read and modify its contents. To clarify the limitations and effectiveness of different defence mechanisms, we lay out a threat model, coupled with a set of assumptions on the adversarial capabilities, for a variety of scenarios. Finally, we explain the mechanics of some attacks on encrypted memory, to illustrate why relying on encryption alone is risky in reality. The paper is addressed to individuals and organisations with a need to consider physical attacks as part of their threat scope and to companies considering solutions to isolate system administrators from customer data in virtualised environments.
Keywords: memory encryption; data-only exploits; hardware attacks; TOCTOU race condition (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/4827/download/ (application/pdf)
https://hstalks.com/article/4827/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:3:p:199-206
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().