Loading…
Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters
Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the security community, namely persistent security. As NVM-based memories are expected to restore their data after recovery, the security metadata must be recovered as well. However, persisting all affected security metadata on each m...
Saved in:
Published in: | arXiv.org 2019-11 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Alwadi, Mazen Aziz Mohaisen Awad, Amro |
description | Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the security community, namely persistent security. As NVM-based memories are expected to restore their data after recovery, the security metadata must be recovered as well. However, persisting all affected security metadata on each memory write would significantly degrade performance and exacerbate the write endurance problem. Moreover, recovery time can increase significantly (up to hours for practical memory sizes) when security metadata are not updated strictly. Counter trees are used in state-of-the-art commercial secure processors, e.g., Intel's Safe Guard Extension (SGX). Counter trees have a unique challenge due to the inability to recover the whole tree from leaves. Thus, to ensure recoverability, all updates to the tree must be persisted, which can be tens of additional writes on each write. The state-of-art scheme, Anubis, enables recoverability but incurs an additional write per cache eviction, i.e., reduces lifetime to approximately half. Additionally, Anubis degrades performance significantly in many cases. In this paper, we propose Phoenix, a practical novel scheme which relies on elegantly reproducing the cache content before a crash, however with minimal overheads. Our evaluation results show that Phoenix reduces persisting security metadata overhead writes from 87\% extra writes (for Anubis) to less than write-back compared to an encrypted system without recovery, thus improving the NVM lifetime by 2x. Overall Phoenix performance is better than the baseline, unlike Anubis which adds 7.9\% (max of 35\%) performance overhead. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2312395608</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2312395608</sourcerecordid><originalsourceid>FETCH-proquest_journals_23123956083</originalsourceid><addsrcrecordid>eNqNi8sKgkAYRocgSMp3-KFtwjiTZm0laVNEDW1l0l9SZKbm0uXtc9EDtPo4nPONSMA4j6NsydiEhNZ2lFKWrliS8ICI402jat8bEPolTW3hiMa21qFy_QfOWHmDCzhhpZ9o5LUfQKoaDpc9FKZFVQ-VMIigG8i1V264z8i4kb3F8LdTMi-2It9Fd6MfHq0rO-2NGlTJeMz4Oklpxv-rviu3P7g</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2312395608</pqid></control><display><type>article</type><title>Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters</title><source>Publicly Available Content Database</source><creator>Alwadi, Mazen ; Aziz Mohaisen ; Awad, Amro</creator><creatorcontrib>Alwadi, Mazen ; Aziz Mohaisen ; Awad, Amro</creatorcontrib><description>Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the security community, namely persistent security. As NVM-based memories are expected to restore their data after recovery, the security metadata must be recovered as well. However, persisting all affected security metadata on each memory write would significantly degrade performance and exacerbate the write endurance problem. Moreover, recovery time can increase significantly (up to hours for practical memory sizes) when security metadata are not updated strictly. Counter trees are used in state-of-the-art commercial secure processors, e.g., Intel's Safe Guard Extension (SGX). Counter trees have a unique challenge due to the inability to recover the whole tree from leaves. Thus, to ensure recoverability, all updates to the tree must be persisted, which can be tens of additional writes on each write. The state-of-art scheme, Anubis, enables recoverability but incurs an additional write per cache eviction, i.e., reduces lifetime to approximately half. Additionally, Anubis degrades performance significantly in many cases. In this paper, we propose Phoenix, a practical novel scheme which relies on elegantly reproducing the cache content before a crash, however with minimal overheads. Our evaluation results show that Phoenix reduces persisting security metadata overhead writes from 87\% extra writes (for Anubis) to less than write-back compared to an encrypted system without recovery, thus improving the NVM lifetime by 2x. Overall Phoenix performance is better than the baseline, unlike Anubis which adds 7.9\% (max of 35\%) performance overhead.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Data recovery ; Endurance ; Metadata ; Performance degradation ; Recoverability ; Recovery time ; Security ; Trees</subject><ispartof>arXiv.org, 2019-11</ispartof><rights>2019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2312395608?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>778,782,25736,36995,44573</link.rule.ids></links><search><creatorcontrib>Alwadi, Mazen</creatorcontrib><creatorcontrib>Aziz Mohaisen</creatorcontrib><creatorcontrib>Awad, Amro</creatorcontrib><title>Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters</title><title>arXiv.org</title><description>Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the security community, namely persistent security. As NVM-based memories are expected to restore their data after recovery, the security metadata must be recovered as well. However, persisting all affected security metadata on each memory write would significantly degrade performance and exacerbate the write endurance problem. Moreover, recovery time can increase significantly (up to hours for practical memory sizes) when security metadata are not updated strictly. Counter trees are used in state-of-the-art commercial secure processors, e.g., Intel's Safe Guard Extension (SGX). Counter trees have a unique challenge due to the inability to recover the whole tree from leaves. Thus, to ensure recoverability, all updates to the tree must be persisted, which can be tens of additional writes on each write. The state-of-art scheme, Anubis, enables recoverability but incurs an additional write per cache eviction, i.e., reduces lifetime to approximately half. Additionally, Anubis degrades performance significantly in many cases. In this paper, we propose Phoenix, a practical novel scheme which relies on elegantly reproducing the cache content before a crash, however with minimal overheads. Our evaluation results show that Phoenix reduces persisting security metadata overhead writes from 87\% extra writes (for Anubis) to less than write-back compared to an encrypted system without recovery, thus improving the NVM lifetime by 2x. Overall Phoenix performance is better than the baseline, unlike Anubis which adds 7.9\% (max of 35\%) performance overhead.</description><subject>Data recovery</subject><subject>Endurance</subject><subject>Metadata</subject><subject>Performance degradation</subject><subject>Recoverability</subject><subject>Recovery time</subject><subject>Security</subject><subject>Trees</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNi8sKgkAYRocgSMp3-KFtwjiTZm0laVNEDW1l0l9SZKbm0uXtc9EDtPo4nPONSMA4j6NsydiEhNZ2lFKWrliS8ICI402jat8bEPolTW3hiMa21qFy_QfOWHmDCzhhpZ9o5LUfQKoaDpc9FKZFVQ-VMIigG8i1V264z8i4kb3F8LdTMi-2It9Fd6MfHq0rO-2NGlTJeMz4Oklpxv-rviu3P7g</recordid><startdate>20191105</startdate><enddate>20191105</enddate><creator>Alwadi, Mazen</creator><creator>Aziz Mohaisen</creator><creator>Awad, Amro</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20191105</creationdate><title>Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters</title><author>Alwadi, Mazen ; Aziz Mohaisen ; Awad, Amro</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_23123956083</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Data recovery</topic><topic>Endurance</topic><topic>Metadata</topic><topic>Performance degradation</topic><topic>Recoverability</topic><topic>Recovery time</topic><topic>Security</topic><topic>Trees</topic><toplevel>online_resources</toplevel><creatorcontrib>Alwadi, Mazen</creatorcontrib><creatorcontrib>Aziz Mohaisen</creatorcontrib><creatorcontrib>Awad, Amro</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alwadi, Mazen</au><au>Aziz Mohaisen</au><au>Awad, Amro</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters</atitle><jtitle>arXiv.org</jtitle><date>2019-11-05</date><risdate>2019</risdate><eissn>2331-8422</eissn><abstract>Emerging Non-Volatile Memories (NVMs) bring a unique challenge to the security community, namely persistent security. As NVM-based memories are expected to restore their data after recovery, the security metadata must be recovered as well. However, persisting all affected security metadata on each memory write would significantly degrade performance and exacerbate the write endurance problem. Moreover, recovery time can increase significantly (up to hours for practical memory sizes) when security metadata are not updated strictly. Counter trees are used in state-of-the-art commercial secure processors, e.g., Intel's Safe Guard Extension (SGX). Counter trees have a unique challenge due to the inability to recover the whole tree from leaves. Thus, to ensure recoverability, all updates to the tree must be persisted, which can be tens of additional writes on each write. The state-of-art scheme, Anubis, enables recoverability but incurs an additional write per cache eviction, i.e., reduces lifetime to approximately half. Additionally, Anubis degrades performance significantly in many cases. In this paper, we propose Phoenix, a practical novel scheme which relies on elegantly reproducing the cache content before a crash, however with minimal overheads. Our evaluation results show that Phoenix reduces persisting security metadata overhead writes from 87\% extra writes (for Anubis) to less than write-back compared to an encrypted system without recovery, thus improving the NVM lifetime by 2x. Overall Phoenix performance is better than the baseline, unlike Anubis which adds 7.9\% (max of 35\%) performance overhead.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2019-11 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2312395608 |
source | Publicly Available Content Database |
subjects | Data recovery Endurance Metadata Performance degradation Recoverability Recovery time Security Trees |
title | Phoenix: Towards Persistently Secure, Recoverable, and NVM Friendly Tree of Counters |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T22%3A48%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Phoenix:%20Towards%20Persistently%20Secure,%20Recoverable,%20and%20NVM%20Friendly%20Tree%20of%20Counters&rft.jtitle=arXiv.org&rft.au=Alwadi,%20Mazen&rft.date=2019-11-05&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2312395608%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_23123956083%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2312395608&rft_id=info:pmid/&rfr_iscdi=true |