Research Article
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories
@ARTICLE{10.4108/eai.13-7-2018.165516, author={Mazen Alwadi and Amro Awad}, title={Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories}, journal={EAI Endorsed Transactions on Security and Safety}, volume={7}, number={24}, publisher={EAI}, journal_a={SESA}, year={2020}, month={8}, keywords={Fabric-Attached Memory, Secure Memory, Memory-Centric, Encrypted Memory, Integrity Tree}, doi={10.4108/eai.13-7-2018.165516} }
- Mazen Alwadi
Amro Awad
Year: 2020
Caching Techniques for Security Metadata in Integrity-Protected Fabric-Attached Memories
SESA
EAI
DOI: 10.4108/eai.13-7-2018.165516
Abstract
The constant need for larger memories and the diversity of workloads have driving the system vendors away from the conventional processor-centric architecture into a memory-centric architecture. Memorycentric architecture, allows multiple computing nodes to connect to a huge shared memory pool and access it directly. To improve the performance, each node uses a small local memory to cache the data. These architectures introduces several problems when memory encryption and integrity verification are implemented. For instance, using a single integrity tree to protect both memories can introduce unnecessary overheads. Therefore, we propose Split-Tree, which implements two separate integrity tree for each memory. Later, we analyze the system performance, and the security metadata caches behavior when separate trees are used. We use the gathered insights to improve the security metadata caching for the separate trees and ultimately improve the system performance.
Copyright © 2020 Mazen Alwadi et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.