Commit 91bdbc15 authored by Xunnamius (Zara)'s avatar Xunnamius (Zara)

updates

parent ad2edb88
......@@ -72,8 +72,8 @@ which area of the backing store receives I/O.
In the case of Forward switching, it is tempting to implement it such that a
nugget is completely re-ciphered during I/O every time its metadata indicates
that it was previously encrypted using a non-active cipher. However, such a
naive implementation can have disastrous effects on performance. \TO\DO{It is not
clear why that would be disastrous.}
naive implementation can have disastrous effects on performance. \TO\DO{It is
not clear why that would be disastrous.}
First, a nugget is considered \emph{pristine} if it has not had any data written
into it yet. SwitchCrypt determines if a nugget is pristine by checking the
......
......@@ -76,9 +76,9 @@ concerns is not simply linear, however, which exposes a rich security vs
latency/energy tradeoff space.
Besides the 4KB workload, the shape of each workload follows a similar
superlinear latency-vs-security trend, hence we will mostly focus on 40MB and 4KB
workloads going forward. Due to the overhead of metadata management and the fast
completion time of the 4KB workloads (\ie{little time for amortization of
superlinear latency-vs-security trend, hence we will mostly focus on 40MB and
4KB workloads going forward. Due to the overhead of metadata management and the
fast completion time of the 4KB workloads (\ie{little time for amortization of
overhead}), ChaCha8 and ChaCha20 take longer to complete than the higher scoring
Freestyle Fast. This advantage is not enough to make Freestyle Balanced or
Secure complete faster than the ChaCha variants, however.
......
......@@ -180,10 +180,10 @@ TRIM and completes in as little as 3
seconds~\cite{SeaGate,Samsung,ThatOtherOEM}. Once complete, the most secure form
of the data is all that remains. The backing store has been ``locked down.''
Our goal is to lock down the backing store, slowing down any attacker as
much as possible such that, even if they copy and permanently store her data
off-site for later attempts at decryption with more advanced compute resources
and new technologies, our researcher's data is some degree more likely to remain
Our goal is to lock down the backing store, slowing down any attacker as much as
possible such that, even if they copy and permanently store her data off-site
for later attempts at decryption with more advanced compute resources and new
technologies, our researcher's data is some degree more likely to remain
irrecoverable. We show that, given a device that supports SSD ISE, SwitchCrypt,
and the Mirrored strategy, we can quickly and practically converge the backing
store to this locked down state. With prior work, data is either too weakly
......
......@@ -345,7 +345,7 @@
%% use defaults for review submission.
\acmYear{2020}
%\acmConference[short name]{long name}{dates}{venue}
\acmConference[EUROSYS]{The European Conference on Computer Systems}{2020}{X}
\acmConference[]{}{}{}
\acmBooktitle{}
\acmPrice{}
\acmDOI{} % \acmDOI{10.1145/nnnnnnn.nnnnnnn}
......
@inproceedings{isca1,
author = {Jonathan Valamehr and
Melissa Chase and
Seny Kamara and
Andrew Putnam and
Daniel Shumow and
Vinod Vaikuntanathan and
Timothy Sherwood},
title = {Inspection resistant memory: Architectural support for security from
physical examination},
booktitle = {39th International Symposium on Computer Architecture {(ISCA} 2012),
June 9-13, 2012, Portland, OR, {USA}},
pages = {130--141},
year = {2012},
_crossref = {DBLP:conf/isca/2012},
url = {https://doi.org/10.1109/ISCA.2012.6237012},
doi = {10.1109/ISCA.2012.6237012},
timestamp = {Tue, 23 May 2017 01:12:16 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/isca/ValamehrCKPSVS12},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{isca2,
author = {Mohit Tiwari and
Jason Oberg and
Xun Li and
Jonathan Valamehr and
Timothy E. Levin and
Ben Hardekopf and
Ryan Kastner and
Frederic T. Chong and
Timothy Sherwood},
title = {Crafting a usable microkernel, processor, and {I/O} system with strict
and provable information flow security},
booktitle = {38th International Symposium on Computer Architecture {(ISCA} 2011),
June 4-8, 2011, San Jose, CA, {USA}},
pages = {189--200},
year = {2011},
_crossref = {DBLP:conf/isca/2011},
url = {http://doi.acm.org/10.1145/2000064.2000087},
doi = {10.1145/2000064.2000087},
timestamp = {Sat, 29 Apr 2017 16:20:37 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/isca/TiwariOLVLHKCS11},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{asplos1,
author = {Andrew Ferraiuolo and
Rui Xu and
Danfeng Zhang and
Andrew C. Myers and
G. Edward Suh},
title = {Verification of a Practical Hardware Security Architecture Through
Static Information Flow Analysis},
booktitle = {Proceedings of the Twenty-Second International Conference on Architectural
Support for Programming Languages and Operating Systems, {ASPLOS}
2017, Xi'an, China, April 8-12, 2017},
pages = {555--568},
year = {2017},
_crossref = {DBLP:conf/asplos/2017},
url = {http://doi.acm.org/10.1145/3037697.3037739},
doi = {10.1145/3037697.3037739},
timestamp = {Wed, 05 Apr 2017 10:02:53 +0200},
biburl = {http://dblp.uni-trier.de/rec/bib/conf/asplos/FerraiuoloXZMS17},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@techreport{Poly1305,
institution="University of Illinois at Chicago",
title="The Poly1305-AES message-authentication code",
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment