Storage management strategy can be expressed by a file system. Commercial file system for embedded application is generally complicated and resource wasted. In this paper, a specified file system adapted to embedded s...Storage management strategy can be expressed by a file system. Commercial file system for embedded application is generally complicated and resource wasted. In this paper, a specified file system adapted to embedded system with flash-based memory is developed. To guarantee the average usage of flash storage sectors, the strategy of wear leveling and adaptive damage management is introduced, in which a dynamic storage space management mode and the strategy of first in first out (FIFO) are adopted. Moreover, the strategy of redundancy design and fast-calculation and tracing is also adopted to extend the life of kernel sector, which can guarantee the reliable service of system booting. The practical application in an embedded CNC (computerized numerical control) platform proves that the file system has effective performance. Furthermore, the flash file system can be transplanted to different embedded platforms by changing a few bottom hardware parameters with universality.展开更多
As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing securit...As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA.展开更多
基金Supported by National Natural Science Foundation of China (No50475117)Specialized Research Fund for the Doctoral Program of Higher Education of China (No20060056016)
文摘Storage management strategy can be expressed by a file system. Commercial file system for embedded application is generally complicated and resource wasted. In this paper, a specified file system adapted to embedded system with flash-based memory is developed. To guarantee the average usage of flash storage sectors, the strategy of wear leveling and adaptive damage management is introduced, in which a dynamic storage space management mode and the strategy of first in first out (FIFO) are adopted. Moreover, the strategy of redundancy design and fast-calculation and tracing is also adopted to extend the life of kernel sector, which can guarantee the reliable service of system booting. The practical application in an embedded CNC (computerized numerical control) platform proves that the file system has effective performance. Furthermore, the flash file system can be transplanted to different embedded platforms by changing a few bottom hardware parameters with universality.
基金Project supported by the National High-Tech R&D Program(863)of China(Nos.2015AA015301 and 2015AA016701)the National Natural Science Foundation of China(Nos.61303046,61472153,61502190,and 61232004)+2 种基金the State Key Laboratory of Computer Architecture(No.CARCH201505)the Wuhan Applied Basic Research Project,China(No.2015010101010004)the Engineering Research Center of Data Storage Systems and Technology,Ministry of Education,China
文摘As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA.