Exzess: Hardware-based RAM encryption against physical memory disclosure

Würstlein A, Gernoth M, Götzfried J, Müller T (2016)


Publication Status: Published

Publication Type: Conference contribution, Conference Contribution

Publication year: 2016

Publisher: Springer Verlag

Book Volume: 9637

Pages Range: 60-71

ISBN: 9783319306940

URI: https://www4.cs.fau.de/~arw/exzess

DOI: 10.1007/978-3-319-30695-7_5

Abstract

The main memory of today’s computers contains lots of sensitive data, in particular from applications that have been used recently. As data within RAM is stored in cleartext, it is exposed to attackers with physical access to a system. In this paper we introduce Exzess, a hardware-based mitigation against physical memory disclosure attacks such as, for example, cold boot and DMA attacks. Our FPGA-based prototype with accompanying software components demonstrates the viability, security and performance of our novel approach for partial main memory encryption via memory proxies. The memory proxy approach will be compared to other existing mitigation techniques and possible further uses beyond encryption will be discussed, as well. Exzess effectively protects against physical attacks on main memory while being transparent to applications and the operating system after initialization.

Authors with CRIS profile

Additional Organisation(s)

How to cite

APA:

Würstlein, A., Gernoth, M., Götzfried, J., & Müller, T. (2016). Exzess: Hardware-based RAM encryption against physical memory disclosure. In Proceedings of the 29th International Conference on Architecture of Computing Systems, ARCS 2016 (pp. 60-71). Springer Verlag.

MLA:

Würstlein, Alexander, et al. "Exzess: Hardware-based RAM encryption against physical memory disclosure." Proceedings of the 29th International Conference on Architecture of Computing Systems, ARCS 2016 Springer Verlag, 2016. 60-71.

BibTeX: Download