Show simple item record

dc.contributor.authorRen, Ling
dc.contributor.authorYu, Xiangyao
dc.contributor.authorDevadas, Srinivas
dc.contributor.authorFletcher, Christopher Wardlaw
dc.contributor.authorVan Dijk, Marten
dc.date.accessioned2014-04-14T18:23:00Z
dc.date.available2014-04-14T18:23:00Z
dc.date.issued2013-06
dc.identifier.isbn9781450320795
dc.identifier.urihttp://hdl.handle.net/1721.1/86164
dc.description.abstractKeeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence that goes off-chip may still leak information. To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM). ORAM has mainly been explored in server/file settings which assume a vastly different computation model than secure processors. Not surprisingly, naïvely applying ORAM to a secure processor setting incurs large performance overheads. In this paper, a recent proposal called Path ORAM is studied. We demonstrate techniques to make Path ORAM practical in a secure processor setting. We introduce background eviction schemes to prevent Path ORAM failure and allow for a performance-driven design space exploration. We propose a concept called super blocks to further improve Path ORAM's performance, and also show an efficient integrity verification scheme for Path ORAM. With our optimizations, Path ORAM overhead drops by 41.8%, and SPEC benchmark execution time improves by 52.4% in relation to a baseline configuration. Our work can be used to improve the security level of previous secure processors.en_US
dc.description.sponsorshipNational Science Foundation (U.S.). Graduate Research Fellowship Program (Grant 1122374)en_US
dc.description.sponsorshipAmerican Society for Engineering Education. National Defense Science and Engineering Graduate Fellowshipen_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (Clean-slate design of Resilient, Adaptive, Secure Hosts Contract N66001-10-2-4089)en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2485922.2485971en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceOther repositoryen_US
dc.titleDesign space exploration and optimization of path oblivious RAM in secure processorsen_US
dc.typeArticleen_US
dc.identifier.citationLing Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. 2013. Design space exploration and optimization of path oblivious RAM in secure processors. SIGARCH Comput. Archit. News 41, 3 (June 2013), 571-582.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorRen, Lingen_US
dc.contributor.mitauthorYu, Xiangyaoen_US
dc.contributor.mitauthorFletcher, Christopher Wardlawen_US
dc.contributor.mitauthorVan Dijk, Martenen_US
dc.contributor.mitauthorDevadas, Srinivasen_US
dc.relation.journalProceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsRen, Ling; Yu, Xiangyao; Fletcher, Christopher W.; van Dijk, Marten; Devadas, Srinivasen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
dc.identifier.orcidhttps://orcid.org/0000-0003-4317-3457
dc.identifier.orcidhttps://orcid.org/0000-0003-3437-7570
dc.identifier.orcidhttps://orcid.org/0000-0002-1224-0314
dc.identifier.orcidhttps://orcid.org/0000-0003-1467-2150
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record