File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

문현곤

Moon, Hyungon
Computer Systems Security Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization

Author(s)
You, JunseungLee, KyeongryongMoon, HyungonCho, YeongpilPaek, Yunheung
Issued Date
2023-10-30
DOI
10.1145/3620678.3624658
URI
https://scholarworks.unist.ac.kr/handle/201301/66442
Citation
ACM Symposium on Cloud Computing, pp.233 - 248
Abstract
AMD’s Secure Encrypted Virtualization (SEV) is a hardware-based Trusted Execution Environment (TEE) designed to secure tenants’ data on the cloud, even against insider threats. The latest version of SEV, SEV-Secure Nested Paging (SEV-SNP), offers protection against most well-known attacks such as cold boot and hypervisor-based attacks. However, it remains susceptible to a specific type of attack known as Active DRAM Corruption (ADC), where attackers manipulate memory content using specially crafted memory devices. The in-memory key-value store (KVS) on SEV is a prime target for ADC attacks due to its critical role in cloud infrastructure and the predictability of its data structures. To counter this threat, we propose KVSEV, an in-memory KVS resilient to ADC attacks. KVSEV leverages SNP’s Virtual Machine Management (VMM) and attestation mechanism to protect the integrity of key-value pairs, thereby securing the KVS from ADC attacks. Our evaluation shows that KVSEV secures in-memory KVSs on SEV with a performance overhead comparable to other secure in-memory KVS solutions.
Publisher
Association for Computing Machinery, Inc

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.