Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization

Full metadata record
DC Field Value Language
dc.contributor.authorYou, Junseung-
dc.contributor.authorLee, Kyeongryong-
dc.contributor.authorMoon, Hyungon-
dc.contributor.authorCho, Yeongpil-
dc.contributor.authorPaek, Yunheung-
dc.date.accessioned2023-12-11T07:31:27Z-
dc.date.available2023-12-11T07:31:27Z-
dc.date.issued2023-10-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/193245-
dc.description.abstractAMD’s Secure Encrypted Virtualization (SEV) is a hardware-based Trusted Execution Environment (TEE) designed to secure tenants’ data on the cloud, even against insider threats. The latest version of SEV, SEV-Secure Nested Paging (SEV-SNP), offers protection against most well-known attacks such as cold boot and hypervisor-based attacks. However, it remains susceptible to a specific type of attack known as Active DRAM Corruption (ADC), where attackers manipulate memory content using specially crafted memory devices. The in-memory key-value store (KVS) on SEV is a prime target for ADC attacks due to its critical role in cloud infrastructure and the predictability of its data structures. To counter this threat, we propose KVSEV, an in-memory KVS resilient to ADC attacks. KVSEV leverages SNP’s Virtual Machine Management (VMM) and attestation mechanism to protect the integrity of key-value pairs, thereby securing the KVS from ADC attacks. Our evaluation shows that KVSEV secures in-memory KVSs on SEV with a performance overhead comparable to other secure in-memory KVS solutions. © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM.-
dc.format.extent16-
dc.language영어-
dc.language.isoENG-
dc.publisherAssociation for Computing Machinery, Inc-
dc.titleKVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization-
dc.typeArticle-
dc.identifier.doi10.1145/3620678.3624658-
dc.identifier.scopusid2-s2.0-85178501929-
dc.identifier.bibliographicCitationSoCC 2023 - Proceedings of the 2023 ACM Symposium on Cloud Computing, pp 233 - 248-
dc.citation.titleSoCC 2023 - Proceedings of the 2023 ACM Symposium on Cloud Computing-
dc.citation.startPage233-
dc.citation.endPage248-
dc.type.docTypeConference paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusCryptography-
dc.subject.keywordPlusDynamic random access storage-
dc.subject.keywordPlusTrusted computing-
dc.subject.keywordPlusVirtual reality-
dc.subject.keywordAuthorConfidential computing-
dc.subject.keywordAuthorKey-value store-
dc.subject.keywordAuthorSecure Encrypted Virtualization-
dc.subject.keywordAuthorTrusted execution environments-
dc.identifier.urlhttps://dl.acm.org/doi/10.1145/3620678.3624658-
Files in This Item
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Cho, Yeong pil photo

Cho, Yeong pil
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE