Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The issue is that any memory readable by a software directly has some kind of risks, including SRAM. Here is something something you might find interesting: https://forte-research.com/UnTrustZone/ There is no absolute security, but keeping secure memory away from software provides much better solution.


TrustZone is not a great solution here, the decryption needs to be fast, and this really means that the key should be directly accessible to the kernel.

Having it only inside the cache SRAM mitigates all the offline attacks. SRAM immediately loses content on power disruption (its state is encoded in the current path, not in a capacitor charge). And it's trivial to completely and unconditionally erase on boot.


Just have the CPU microcode clear SRAM whenever the CPU is booted


That is what that paper says. No cpu does that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: