Abstract:
A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a "time stamp" indicator. An incrementing mechanism using the "time stamp" indicator generates a tweak which separates different contexts over different times such that the effect of "Type 2 replay attacks" is mitigated.
Abstract:
Eine beispielhafte Vorrichtung zum Durchführen einer Faltung an einem Eingabetensor enthält einen Parametergenerator, um: einen horizontalen Hardwareausführungsparameter für eine horizontale Dimension des Eingabetensors auf Grundlage eines Kernelparameters und eines Schichtparameters zu generieren; und einen vertikalen Hardwareausführungsparameter für eine vertikale Dimension des Eingabetensors auf Grundlage des Kernelparameters und des Schichtparameters zu generieren; eine Beschleunigerschnittstelle, um eine Hardwarebeschleunigerverschaltung auf Grundlage des horizontalen und des vertikalen Hardwareausführungsparameters zu konfigurieren; eine horizontale Iteratorsteuerung, um zu ermitteln, wann die Hardwarebeschleunigerverschaltung die erste horizontale Iteration der Faltung abschließt; und eine vertikale Iteratorsteuerung, um zu ermitteln, wann die Hardwarebeschleunigerverschaltung die erste vertikale Iteration der Faltung abschließt.
Abstract:
A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a "time stamp" indicator. An incrementing mechanism using the "time stamp" indicator generates a tweak which separates different contexts over different times such that the effect of "Type 2 replay attacks" is mitigated.
Abstract:
In some embodiments a controller controls an input device, receives input information from the input device, excludes a host processor from controlling the input device, and secures the input information received from the input device so that the input information is not received by the host processor or by any software running on the host processor. Other embodiments are described and claimed.
Abstract:
A method and apparatus to provide cryptographic integrity checks and replay protection to protect against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. A tree-based replay protection scheme uses standard XTS-AES to encrypt contents of a cache line in the system memory. A Message-Authentication Code (MAC) for the cache line is encrypted using enhanced XTS-AES and a “time stamp” indicator associated with the cache line. The “time stamp indicator” is stored in a processor.
Abstract:
A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a "time stamp" indicator. An incrementing mechanism using the "time stamp" indicator generates a tweak which separates different contexts over different times such that the effect of "Type 2 replay attacks" is mitigated.