MemCloak

Weixin Liang,Kai Bu,Ke Li,Jinhong Li,Arya Tavakoli
DOI: https://doi.org/10.1145/3274694.3274695
2018-01-01
Abstract:Access patterns over untrusted memory have long been exploited to infer sensitive information like program types or even secret keys. Most existing obfuscation solutions hide real memory accesses among a sufficiently large number of dummy memory accesses. Such solutions lead to a heavy communication overhead and more often apply to the client/server scenario instead of the CPU/memory architecture. Sporadic obfuscation solutions strive for an affordable memory bandwidth cost at the expense of security degradation. For example, they may have to obfuscate accesses over a limited range of memory space to control the overhead.
What problem does this paper attempt to address?