About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sesa 21(24): e1

Research Article

Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories

Download1255 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.13-7-2018.165516,
        author={Mazen Alwadi and Amro Awad},
        title={Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={7},
        number={24},
        publisher={EAI},
        journal_a={SESA},
        year={2020},
        month={8},
        keywords={Fabric-Attached Memory, Secure Memory, Memory-Centric, Encrypted Memory, Integrity Tree},
        doi={10.4108/eai.13-7-2018.165516}
    }
    
  • Mazen Alwadi
    Amro Awad
    Year: 2020
    Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories
    SESA
    EAI
    DOI: 10.4108/eai.13-7-2018.165516
Mazen Alwadi1,*, Amro Awad1
  • 1: University of Central Florida, Electrical and Computer Engineering Department, Orlando, FL, United States
*Contact email: mazen.alwadi@knights.ucf.edu

Abstract

The constant need for larger memories and the diversity of workloads have driving the system vendors away from the conventional processor-centric architecture into a memory-centric architecture. Memorycentric architecture, allows multiple computing nodes to connect to a huge shared memory pool and access it directly. To improve the performance, each node uses a small local memory to cache the data. These architectures introduces several problems when memory encryption and integrity verification are implemented. For instance, using a single integrity tree to protect both memories can introduce unnecessary overheads. Therefore, we propose Split-Tree, which implements two separate integrity tree for each memory. Later, we analyze the system performance, and the security metadata caches behavior when separate trees are used. We use the gathered insights to improve the security metadata caching for the separate trees and ultimately improve the system performance.

Keywords
Fabric-Attached Memory, Secure Memory, Memory-Centric, Encrypted Memory, Integrity Tree
Received
2020-06-16
Accepted
2020-07-07
Published
2020-08-11
Publisher
EAI
http://dx.doi.org/10.4108/eai.13-7-2018.165516

Copyright © 2020 Mazen Alwadi et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL