• DocumentCode
    1784698
  • Title

    Memory Integrity Protection Method Based on Asymmetric Hash Tree

  • Author

    Ma Haifeng ; Cheng Jie ; Gao Zhenguo

  • Author_Institution
    Comput. & Inf. Eng. Inst., Heilongjiang Univ. of Sci. & Technol., Harbin, China
  • fYear
    2014
  • fDate
    24-27 Nov. 2014
  • Firstpage
    263
  • Lastpage
    267
  • Abstract
    Focus on this question of high verification overhead of hash tree memory protection scheme, this paper proposed a hash tree optimize method called AH-Tree. Utilizing the locality character of memory accessing, the memory is divided into two parts and an asymmetric hash tree (AH-Tree) is constructed. The advantage of AH-Tree is low average operation overhead. The analysis and experiment results proved that the proposed scheme has shorter average verification path and better verify efficiency than hash tree scheme. AH-Tree is a feasible memory integrity protection scheme.
  • Keywords
    data integrity; storage management; tree searching; AH-Tree; asymmetric hash tree scheme; average verification path; hash tree memory integrity protection scheme; hash tree optimize method; high verification overhead; memory accessing; memory integrity protection method; Encryption; Hardware; Memory management; Software; Vegetation; hash tree; integrity; memory; replay attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Distributed Computing and Applications to Business, Engineering and Science (DCABES), 2014 13th International Symposium on
  • Conference_Location
    Xian Ning
  • Print_ISBN
    978-1-4799-4170-4
  • Type

    conf

  • DOI
    10.1109/DCABES.2014.57
  • Filename
    6999100