KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization
DC Field | Value | Language |
---|---|---|
dc.contributor.author | You, Junseung | - |
dc.contributor.author | Lee, Kyeongryong | - |
dc.contributor.author | Moon, Hyungon | - |
dc.contributor.author | Cho, Yeongpil | - |
dc.contributor.author | Paek, Yunheung | - |
dc.date.accessioned | 2023-12-11T07:31:27Z | - |
dc.date.available | 2023-12-11T07:31:27Z | - |
dc.date.issued | 2023-10 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/193245 | - |
dc.description.abstract | AMD’s Secure Encrypted Virtualization (SEV) is a hardware-based Trusted Execution Environment (TEE) designed to secure tenants’ data on the cloud, even against insider threats. The latest version of SEV, SEV-Secure Nested Paging (SEV-SNP), offers protection against most well-known attacks such as cold boot and hypervisor-based attacks. However, it remains susceptible to a specific type of attack known as Active DRAM Corruption (ADC), where attackers manipulate memory content using specially crafted memory devices. The in-memory key-value store (KVS) on SEV is a prime target for ADC attacks due to its critical role in cloud infrastructure and the predictability of its data structures. To counter this threat, we propose KVSEV, an in-memory KVS resilient to ADC attacks. KVSEV leverages SNP’s Virtual Machine Management (VMM) and attestation mechanism to protect the integrity of key-value pairs, thereby securing the KVS from ADC attacks. Our evaluation shows that KVSEV secures in-memory KVSs on SEV with a performance overhead comparable to other secure in-memory KVS solutions. © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM. | - |
dc.format.extent | 16 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Association for Computing Machinery, Inc | - |
dc.title | KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization | - |
dc.type | Article | - |
dc.identifier.doi | 10.1145/3620678.3624658 | - |
dc.identifier.scopusid | 2-s2.0-85178501929 | - |
dc.identifier.bibliographicCitation | SoCC 2023 - Proceedings of the 2023 ACM Symposium on Cloud Computing, pp 233 - 248 | - |
dc.citation.title | SoCC 2023 - Proceedings of the 2023 ACM Symposium on Cloud Computing | - |
dc.citation.startPage | 233 | - |
dc.citation.endPage | 248 | - |
dc.type.docType | Conference paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordPlus | Dynamic random access storage | - |
dc.subject.keywordPlus | Trusted computing | - |
dc.subject.keywordPlus | Virtual reality | - |
dc.subject.keywordAuthor | Confidential computing | - |
dc.subject.keywordAuthor | Key-value store | - |
dc.subject.keywordAuthor | Secure Encrypted Virtualization | - |
dc.subject.keywordAuthor | Trusted execution environments | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/3620678.3624658 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.