1/1 /15
ObfusMem: A Low-Overhead Access Obfuscation fo for Trusted Memories
Amro Awad 1, Yipeng Wang 2, Deborah Shands 3, Yan Solihin 2
1 Sandia National Laboratories 2 North Carolina State University 3 National Science Foundation
ObfusMem: A Low-Overhead Access Obfuscation fo for Trusted Memories - - PowerPoint PPT Presentation
ObfusMem: A Low-Overhead Access Obfuscation fo for Trusted Memories Amro Awad 1 , Yipeng Wang 2 , Deborah Shands 3 , Yan Solihin 2 1 Sandia National Laboratories 2 North Carolina State University 3 National Science Foundation ISCA 2017 Presented
1/1 /15
1 Sandia National Laboratories 2 North Carolina State University 3 National Science Foundation
2/1 /15
Attackers rely on information Consider a heist movie
High High Tec Tech h Vaul Vault New ew Se Secu curi rity ty
2/1 /15
Attackers rely on information Consider a heist movie
Stud Study y the he Blu Bluepri rints ts Inf Infiltr trate te the he Casi asino
2/1 /15
Attackers rely on information Consider a heist movie
Steal Steal the he Mone
Ri Rig the he Gam Games es
Secure systems rely on secure hardware Lots of research in secure processors
3/1 /15
Secure Processor
http://www.doublejdesign.co.uk.
Memory
https://www.flaticon.com/free-icon/missile_182414
https://commons.wikimedia.org/wiki/File:Explosion-155624_icon.svg
Memory Bus
3/1 /15
Secure Processor Memory Memory Bus
http://www.doublejdesign.co.uk.
101
Before Leaving Chip:
011 110
Before Accepting:
Secure systems rely on secure hardware Lots of research in secure processors
Memory bus is vulnerable to snooping Addresses are still transmitted plainly Can still determine request type
3/1 /15
Secure Processor Memory Memory Bus
http://www.doublejdesign.co.uk.
101 011 110
Standard memory devices can’t decrypt addresses
https://clipartxtras.com
Steal important information Prevent system from working Enable a future attack Xbox Case Study (2002)
Probed HyperTransport bus Identified boot code Found decryption algorithm Isolated key in boot code Accessed boot loader
4/1 4/15
in Hardware: the Microsoft XboxTM Case Study. https://dspace.mit.edu/bitstream/handle/1721.1/6694/AIM- 2002-008.pdf?sequence=2 .
https://commons.wikimedia.org/wiki/File:Xbox- Motherboard-Rev1.jpg
Data blocks are shuffled after each access Addresses are mapped to paths in tree
Secure Processor Memory
Position Map: ORAM Controller
Physical Address Tree Path
3
Leaf Node
block X
Decrypt as you go
http://www.doublejdesign.co.uk.
5/1 /15
Different ways to reassign the blocks Dummy blocks are also needed
Secure Processor Memory
Position Map: ORAM Controller
Physical Address Tree Path
2
Leaf Node
block X
Evict as needed Dummy blocks
http://www.doublejdesign.co.uk.
5/1 /15
High bandwidth overhead Early device wear-out (100x writes) Dummy blocks require space Slow performance Possible system deadlock
Can’t evict! Dummy blocks
6/1 /15
Secure Processor Secure Memory
ObfusMem Controller
CPU and memory have ObfusMem controller. Extends trust base to include memory. Keys used to create a secure channel.
http://www.doublejdesign.co.uk.
commands, addresses, data …
7/1 /15 ObfusMem Controller
Use logic layer in 3/2.5D stacked memory
http://farm8.staticflickr.com/7013/643652 5561_27bf9b4eaf.jpg.
8/1 /15
Memory Processor Memory Memory
Public Private Public Private Public Private Public Private
Keys burned in by manufacturer
http://www.doublejdesign.co.uk.
http://farm8.staticflickr.com/7013/6436525561_27bf9b4eaf.jpg.
https://www.iconfinder.com/icons/298808/key_icon.
8/1 /15
Memory Processor Memory Memory
Public Private Public Private Public Private Public Private Public Public Public Public Public
Share Public Keys:
http://www.doublejdesign.co.uk.
http://farm8.staticflickr.com/7013/6436525561_27bf9b4eaf.jpg.
https://www.iconfinder.com/icons/298808/key_icon.
Public
8/1 /15
Memory Processor Memory Memory
Shared Shared Shared Shared Shared Shared
http://www.doublejdesign.co.uk.
http://farm8.staticflickr.com/7013/6436525561_27bf9b4eaf.jpg.
https://www.iconfinder.com/icons/298808/key_icon.
Establish Session Keys:
using public keys
9/1 /15
Patterns to obfuscate
Spatial
Temporal
Command
Memory Footprint
10/15
Method: use counter mode encryption
...twice
Commons. https://commons.wikimedia.org/wiki/File:CTR_encryp tion_2.svg.
11/15
Method: pair each read with a dummy write, and vice
A fixed location in memory is used for the dummy
CTR mode encryption ensures it’ll never look the same
generation.” Obfusmem. ACM Digital Library. https://dl.acm.org/citation.cfm?id=3080230.
12/15
Method: idle channel dummy replication Fake a request on any idle channel during a real one
http://studyforyourcerts.blogspot.com/2015/01/.
13/15
ORAM adds 946.1% to execution time and 100%
ObfusMem adds 10.9% on average and 32.1% worst
https://dl.acm.org/citation.cfm?id=3080230.
14/15 4/15
Multiprocessor systems’ cache coherence protocols
ObfusMem remains susceptible to thermal and timing
ACM Digital Library. https://dl.acm.org/citation.cfm?id=3080230.
15/15
Is it a problem that ObfusMem does not protect from
15/15
Is it feasible to assume the memory is not vulnerable to
15/15
Is ObfusMem strictly better than ORAM?