期刊文献+

新型非易失存储的安全与隐私问题研究综述 被引量:6

A Survey on Security and Privacy of Emerging Non-Volatile Memory
下载PDF
导出
摘要 近年来,以相变存储器(phase change memory,PCM)为代表的各种新型非易失存储(nonvolatile memory,NVM)技术得到广泛关注.NVM同时具有传统内存的字节寻址特性和外存的非易失特性,因而可以同时替代内存和外存,也可以用于混合存储体系结构.NVM具有低延时、高密度、低功耗的优势,有效缓解了存储墙问题.然而,由于应用程序可以直接通过存取指令(load/store)接口访问NVM,并且掉电后存储在NVM上的信息不会丢失,这给NVM的应用带来了一些新的安全和隐私挑战.首先讨论了持久化内存泄漏、不经意写操作、元数据安全、恶意磨损攻击、非易失指针等NVM应用中可能存在的安全问题以及最新的解决方案;然后讨论了数据保护、信息泄露等NVM应用中可能存在的隐私问题及现有的解决方案;最后探讨了NVM还需解决的安全和隐私问题,包括非易失缓存、程序安全等,并提出了一些解决方案,包括权限和保护机制的融合、使用易失性的NVM等. In recent years, emerging non-volatile memory (NVM) technologies, such as phase change memory (PCM), spin-transfer torque RAM (STT-RAM), and memristor have gained great attention of researchers. NVM has both byte-addressable and non-volatile features, thereby making it possible to replace both traditional main memory and persistent storage. Also, NVM can be used in hybrid memory and storage architecture. Due to the advantages of low latency, high density, and low power, NVM has become the promising memory technology because of the effect of alleviating memory wall problem. However, applications can access NVM directly through ordinary load/store interface, and more important, data resided in the NVM still retains after power loss, thus it imposes new challenges of security and privacy. This paper surveys several security problems about NVM and existing solutions including persistent memory leak, stray writes, metadata security, malicious wearout attacks, and non-volatile pointer. Then, privacy issues and existing studies about NVM, such as data protection and information leaks, are discussed. Finally, we explore other potential security and privacy issues related to NVM and propose several possible solutions, such as convergence of permission and protection, security of non-volatile cache, volatile NVM, and program security.
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第9期1930-1942,共13页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61472260 61402302) 北京市自然科学基金项目(4143060) 计算机体系结构国家重点实验室开放课题(CARCH201503)~~
关键词 内存泄漏 非易失性存储 安全 隐私 磨损攻击 不经意写 memory leak non volatile memory (NVM) security privacy wearout attack straywrite
  • 相关文献

参考文献44

  • 1Sterling T, Brodowicz M, Gilmanov T. Towards brain- inspired system architectures [C] //Proc of Int Workshop on Brain-Inspired Computing. Berln Springer, 2013 159-170.
  • 2Balasubramonian R, Chang J, Manning T, et al. Near data processing Insights from a MICR0-46 workshop [J]. IEEE Micro, 2014, 34(4) 36-42.
  • 3张鸿斌,范捷,舒继武,胡庆达.基于相变存储器的存储系统与技术综述[J].计算机研究与发展,2014,51(8):1647-1662. 被引量:21
  • 4冒伟,刘景宁,童薇,冯丹,李铮,周文,张双武.基于相变存储器的存储技术研究综述[J].计算机学报,2015,38(5):944-960. 被引量:25
  • 5Strukov D B, Snider G S, Stewart D R, et al. The missing memristor found[J]. Nature, 2008, 453(7191): 80-83.
  • 6HP Labs. The machine: A new kind of computer [EB/OL]. [2015-06-10]. http://www, hpl. hp. corn/research/systems research/themachine.
  • 7Swanson S, Caulfield A M. Refactor, reduce, recycle: Restructuring the I/O stack for the future of storage [J]. Computer, 2013, 46(8): 52-59.
  • 8Enek W, Butler K, Richardson T, et al. Defending against attacks on main memory persistence [C] //Proc of Computer Security Applications Conf. Piscataway, NJ: IEEE, 2008: 65-74.
  • 9Halderman J A, Schoen S D, Heninger N, et al. Lest we remember: Cold-boot attacks on encryption keys [J]. Communications of the ACM, 2009, 52(5) : 91-98.
  • 10Liu R S, Shen D Y, Yang C L, et al. NVM duet: Unified working memory and persistent store architecture [J]. ACM SIGPLAN Notices, 2014, 49(4): 455-470.

二级参考文献95

  • 1刘金垒,李琼.新型非易失相变存储器PCM应用研究[J].计算机研究与发展,2012,49(S1):90-93. 被引量:5
  • 2刘波,宋志棠,封松林.我国相变存储器的研究现状与发展前景[J].微纳电子技术,2007,44(2):55-61. 被引量:14
  • 3Nahas J, Andre T, Subramanian C, et al. A 4Mb 0.18m 1T1MTJ toggle MRAM memory [C]//Proc of IEEE Int Conf on Solid-State Circuits ( ISSCC 2004 ). Piscataway, NJ : IEEE, 2004: 44-512.
  • 4Lee B C, Ipek E, Mutlu O, et al. Architecting phase change memory as a scalable dram alternative[J]. ACM SIGARCH Computer Architecture News, 2009, 37(3): 2-13.
  • 5Bedesehi F, Resta C, Khouri O, et al. An 8Mb demonstrator for high-density 1.8 V phase-change memories [C]//Proc of IEEE Symp on VLSI Circuits, Digest of Technical Papers. Piseataway, NJ: IEEE, 2004:442-445.
  • 6Burr G W, Kurdi B N, Scott J C, et al. Overview of candidate device technologies for storage class memory [J]. IBM Journal of Research and Development, 2008, 52(4): 449-464.
  • 7Qureshi M K, Gurumurthi S, Rajendran B. Phase change memory: From devices to systems [J]. Synthesis Lectures on Computer Architecture, 2011, 6(4): 1-134.
  • 8Qureshi M K, Srinivasan V, Rivers J A. Scalable high performance main memory system using phase-change memory technology [J]. ACM SIGARCH Computer Architecture News, 2009, 37(3): 24-33.
  • 9Chen S, Gibbons P B, Nath S. Rethinking database algorithms for phase change memory [C/OL] //Proc of the 5th Biennial Conf on Innovative Data Systems Research (CIDR 2011). 2011: 21-31. [2013-03-10]. http://www. cidrdb. org/cidr2011/Papers/CIDR11_Paper3. pdf.
  • 10Lee B C, Ipek E, Mutlu O, et al. Architecting phase change memory as a scalabie dram alternative[J]. ACM SIGARCH Computer Architecture News, 2009, 37(3): 2-13.

共引文献39

同被引文献25

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部