TY - JOUR
T1 - Memory protection challenges
T2 - Attacks on memory encryption
AU - Branco, Rodrigo Rubira
AU - Gueron, Shay
PY - 2017
Y1 - 2017
N2 - This paper explains some of the challenges involved in protecting the system memory of a computing platform against adversaries who can read and modify its contents. To clarify the limitations and effectiveness of different defence mechanisms, we lay out a threat model, coupled with a set of assumptions on the adversarial capabilities, for a variety of scenarios. Finally, we explain the mechanics of some attacks on encrypted memory, to illustrate why relying on encryption alone is risky in reality. The paper is addressed to individuals and organisations with a need to consider physical attacks as part of their threat scope and to companies considering solutions to isolate system administrators from customer data in virtualised environments.
AB - This paper explains some of the challenges involved in protecting the system memory of a computing platform against adversaries who can read and modify its contents. To clarify the limitations and effectiveness of different defence mechanisms, we lay out a threat model, coupled with a set of assumptions on the adversarial capabilities, for a variety of scenarios. Finally, we explain the mechanics of some attacks on encrypted memory, to illustrate why relying on encryption alone is risky in reality. The paper is addressed to individuals and organisations with a need to consider physical attacks as part of their threat scope and to companies considering solutions to isolate system administrators from customer data in virtualised environments.
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
VL - 1
SP - 199
EP - 206
JO - Cyber Security: A Peer-Reviewed Journal
JF - Cyber Security: A Peer-Reviewed Journal
SN - 2398-5100
IS - 3
ER -