DocumentCode :
1784698
Title :
Memory Integrity Protection Method Based on Asymmetric Hash Tree
Author :
Ma Haifeng ; Cheng Jie ; Gao Zhenguo
Author_Institution :
Comput. & Inf. Eng. Inst., Heilongjiang Univ. of Sci. & Technol., Harbin, China
fYear :
2014
fDate :
24-27 Nov. 2014
Firstpage :
263
Lastpage :
267
Abstract :
Focus on this question of high verification overhead of hash tree memory protection scheme, this paper proposed a hash tree optimize method called AH-Tree. Utilizing the locality character of memory accessing, the memory is divided into two parts and an asymmetric hash tree (AH-Tree) is constructed. The advantage of AH-Tree is low average operation overhead. The analysis and experiment results proved that the proposed scheme has shorter average verification path and better verify efficiency than hash tree scheme. AH-Tree is a feasible memory integrity protection scheme.
Keywords :
data integrity; storage management; tree searching; AH-Tree; asymmetric hash tree scheme; average verification path; hash tree memory integrity protection scheme; hash tree optimize method; high verification overhead; memory accessing; memory integrity protection method; Encryption; Hardware; Memory management; Software; Vegetation; hash tree; integrity; memory; replay attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing and Applications to Business, Engineering and Science (DCABES), 2014 13th International Symposium on
Conference_Location :
Xian Ning
Print_ISBN :
978-1-4799-4170-4
Type :
conf
DOI :
10.1109/DCABES.2014.57
Filename :
6999100
Link To Document :
بازگشت