Title
Generalized external interaction with tamper-resistant hardware with bounded information leakage
Abstract
This paper investigates secure ways to interact with tamper-resistant hardware leaking a strictly bounded amount of information. Architectural support for the interaction mechanisms is studied and performance implications are evaluated. The interaction mechanisms are built on top of a recently-proposed secure processor Ascend[ascend-stc12]. Ascend is chosen because unlike other tamper-resistant hardware systems, Ascend completely obfuscates pin traffic through the use of Oblivious RAM (ORAM) and periodic ORAM accesses. However, the original Ascend proposal, with the exception of main memory, can only communicate with the outside world at the beginning or end of program execution; no intermediate information transfer is allowed. Our system, Stream-Ascend, is an extension of Ascend that enables intermediate interaction with the outside world. Stream-Ascend significantly improves the generality and efficiency of Ascend in supporting many applications that fit into a streaming model, while maintaining the same security level.Simulation results show that with smart scheduling algorithms, the performance overhead of Stream-Ascend relative to an insecure and idealized baseline processor is only 24.5%, 0.7%, and 3.9% for a set of streaming benchmarks in a large dataset processing application. Stream-Ascend is able to achieve a very high security level with small overheads for a large class of applications.
Year
DOI
Venue
2013
10.1145/2517488.2517498
CCSW
Keywords
Field
DocType
large class,intermediate interaction,outside world,interaction mechanism,large dataset processing application,bounded information leakage,performance implication,intermediate information transfer,tamper-resistant hardware,generalized external interaction,idealized baseline processor,original ascend proposal,high security level,interaction
Oblivious ram,Information transfer,Information leakage,Computer security,Computer science,Scheduling (computing),Computer hardware,Tamper resistance,Generality,Overhead (business),Bounded function,Distributed computing
Conference
Citations 
PageRank 
References 
11
0.59
26
Authors
5
Name
Order
Citations
PageRank
Xiangyao Yu127016.17
Christopher W. Fletcher249331.92
Ling Ren319311.37
Marten Van Dijk42875242.07
Srinivas Devadas586061146.30