Skip to main content

Memory protection challenges: Attacks on memory encryption

Notice

The full text article is not available for purchase.

The publisher only permits individual articles to be downloaded by subscribers.

This paper explains some of the challenges involved in protecting the system memory of a computing platform against adversaries who can read and modify its contents. To clarify the limitations and effectiveness of different defence mechanisms, we lay out a threat model, coupled with a set of assumptions on the adversarial capabilities, for a variety of scenarios. Finally, we explain the mechanics of some attacks on encrypted memory, to illustrate why relying on encryption alone is risky in reality. The paper is addressed to individuals and organisations with a need to consider physical attacks as part of their threat scope and to companies considering solutions to isolate system administrators from customer data in virtualised environments.

Keywords: TOCTOU race condition; data-only exploits; hardware attacks; memory encryption

Document Type: Research Article

Publication date: January 1, 2017

More about this publication?
  • Cyber Security is the major new peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It will showcase the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors.
  • Editorial Board
  • Information for Authors
  • Subscribe to this Title
  • Terms & Conditions
  • Ingenta Connect is not responsible for the content or availability of external websites
  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
UA-1313315-29