Projects per year
Abstract
Modern computing systems rely on error-correcting codes to ensure the integrity of DRAM data. Linear checksums allow for fast detection and correction of specific error patterns. However, they do not offer sufficient protection against complex errors distributed over multiple data words and chips. Depending on the code and the error pattern, linear codes may fail to detect or even miscorrect errors, thus leading to silent data corruption. In this work, we show how compact error-correcting codes based on low-latency hashing functions allow for strong probabilistic error detection and correction while facilitating ECC bit repurposing. Our proposed design drastically lowers the expected rate of undetected errors, regardless of the underlying error patterns. By tailoring the size of our codes to the required level of integrity protection, we are able to free bits that would otherwise be required to store ECC data. We showcase how our design facilitates the efficient implementation of tagged memory architectures such as CHERI, ARM MTE, and SPARC ADI by repurposing the freed bits in commodity ECC DRAM. Thus, we harden systems against data corruption due to DRAM faults while simultaneously allowing for memory tagging without introducing additional memory accesses. We present a systematic analysis of schemes that allow memory tagging on a cache line granularity while maintaining error detection and correction capabilities, even in multi-bit fault scenarios. We evaluate our integrity protection with tagging for different use cases and show that we can store 32 bits of additional tags per cache line, twice the amount needed to implement ARM's MTE, without significantly affecting error correction capabilities. We also show how up to 51 bits can be made available while maintaining single-bit error correction.
Original language | English |
---|---|
Title of host publication | Proceedings of the 32nd USENIX Security Symposium |
Publisher | USENIX Association |
Pages | 2797-2814 |
ISBN (Electronic) | 978-1-939133-37-3 |
Publication status | Published - 15 May 2023 |
Event | 32nd USENIX Security Symposium: USENIX Security 2023 - Anaheim, United States Duration: 9 Aug 2023 → 11 Aug 2023 |
Conference
Conference | 32nd USENIX Security Symposium |
---|---|
Abbreviated title | USENIX Security '23 |
Country/Territory | United States |
City | Anaheim |
Period | 9/08/23 → 11/08/23 |
Fingerprint
Dive into the research topics of 'HashTag: Hash-based Integrity Protection for Tagged Architectures'. Together they form a unique fingerprint.Projects
- 1 Finished
-
SEIZE - Secure Edge Devices For Industrial Zero-Trust Environments
Mangard, S. (Co-Investigator (CoI))
1/01/22 → 31/12/24
Project: Research project
Activities
- 1 Talk at conference or symposium
-
HashTag: Hash-based Integrity Protection for Tagged Architectures
Lamster, L. A. (Speaker)
10 Aug 2023Activity: Talk or presentation › Talk at conference or symposium › Science to science