TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A proposed API for full-memory encryption

149 pointsby l2dyover 6 years ago

9 comments

pdkl95over 6 years ago
&gt; Total Memory Encryption (TME) ... uses a single, CPU-generated key for all of memory; users can control the usage of TME in the boot-level firmware. A new standard ... MKTME ... supports different encryption settings ... at the page level, and more keys. Different keys can be used at the same time for different memory regions.<p>While using multiple keys has legitimate advantages for the user, it&#x27;s also a step towards unbreakable DRM and other malware. It&#x27;s easy to think about how a new technology is <i>useful</i>, but it is prudent to also consider how the technology might be used as a <i>weapon</i>.<p>Memory encryption has obvious niche uses, but seems slightly outside the common threat model for most people (users). The more likely use-case (for the average user) is probably user-hostile: DRM, &quot;Denuvo&quot;-style tamper resistance.<p>edit: Forgot to mention: the single-key variation (TME) can provide a lot of the user-focused benefits, without the DRM proliferation risk.
评论 #19045213 未加载
评论 #19045730 未加载
评论 #19045349 未加载
评论 #19047583 未加载
评论 #19046090 未加载
phkahlerover 6 years ago
&gt;&gt; In a virtualized environment, if attackers can find a way to read memory from neighbor virtual machines, they can access the data from those machines.<p>I would not advocate memory encryption as a defense against this kind of attack. It&#x27;s added complexity to fix a different problem (untrustworthy virtualization). OTOH it is useful to protect against physical access at the hardware level - and that&#x27;s not really a common concern but is valid is some cases.
评论 #19046965 未加载
infogulchover 6 years ago
Does this mitigate any kind of rowhammer attacks? The kernel will be managing the keys, but if normal programs don&#x27;t have access to them they would be unable to predict the actual bytes written, which I think is necessary for rowhammer.
评论 #19046046 未加载
belornover 6 years ago
Correct me if I got this wrong, but what we are talking about is basically having a hardware encryption processor and tmp-like module within the cpu chip itself, sitting between the memory controller and the cpu. Does that also cover the L caches?
评论 #19044704 未加载
swordswinger12over 6 years ago
I don&#x27;t really understand the threat model in which this provides a real security benefit. If someone can inspect the contents of memory, can&#x27;t they also recover the encryption key somehow?
the_arunover 6 years ago
What are the performance implications with memory encryption?
smitherfieldover 6 years ago
All the discussion ITT so far has been about the concept or hardware implementation of full-memory encryption. I&#x27;m wondering if anyone has thoughts about the proposed API.
ape4over 6 years ago
I guess this would help with Meltdown&#x2F;Spectre type bugs.
评论 #19045160 未加载
zatempat80over 6 years ago
What is the encryption algorithm Intel is planning to implement? I can’t seem to find any references to it.