Caches and hash trees for efficient memory integrity verification

B. Gassend, G.E. Suh, D. Clarke, M. Van Dijk, S. Devadas

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

© 2003 IEEE.We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications such as certified program execution. A number of schemes are presented with different levels of integration between the on-processor L2 cache and the hash-tree machinery. Simulations show that for the best of our methods, the performance overhead is less than 25%, a significant decrease from the 10× overhead of a naive implementation.
Original languageEnglish
Title of host publicationProceedings - 9th International Symposium on High-Performance Computer Architecture, HPCA 2003
PublisherIEEE Computer Society
Pages295-306
ISBN (Electronic)0769518710
DOIs
Publication statusPublished - 2003
Externally publishedYes
Event9th IEEE International Symposium on High-Performance Computer Architecture, HPCA 2003 - Anaheim, United States
Duration: 8 Feb 200312 Feb 2003

Publication series

NameProceedings - International Symposium on High-Performance Computer Architecture
ISSN (Print)1530-0897

Conference

Conference9th IEEE International Symposium on High-Performance Computer Architecture, HPCA 2003
Country/TerritoryUnited States
CityAnaheim
Period8/02/0312/02/03

Fingerprint

Dive into the research topics of 'Caches and hash trees for efficient memory integrity verification'. Together they form a unique fingerprint.

Cite this