Showing posts with label Hardware. Show all posts
Showing posts with label Hardware. Show all posts

Wednesday, May 18

Encryption hardware developed for the new technology of computer memory

Ultimate Zip Cracker Software Download

ScienceDaily (May 18, 2011) security are one of the key obstacles to the adoption of a new non-volatile main memory (NVMM) on the next generation, which improve the computer start and times and increase the memory capacity. But now developed researchers from the University of North Carolina new encryption hardware for use with NVMM to protect your personal information and other data.


NVMM technologies, such as phase-change memory, hold great promise to replace conventional dynamic random access memory (DRAM) in main memory of computers. NVMM will allow computers to begin immediately, and can integrate with more memory and the same amount of space used by existing technologies. However, NVMM is a security risk.


The standard of DRAM main memory stores data after the computer is turned off. That is, for example, that does not store your credit card number and password after the online shopping spree. NVMM, on the other hand, preserves all user data in main memory, and even years after the computer is turned off. This feature may give criminals access to your personal information or other data if your laptop or smart phone were stolen. And, because NVMM the data is stored in main memory, it cannot be encrypted by using the software. Software cannot manage main memory functions, because the software itself is in main memory.


NC State researchers have developed a solution using hardware encryption system called i-NVMM.


"We use hardware to encrypt everything," explains Dr. Yan Solihin, Professor of electrical and computer engineering at NC State and co-author of paper describing i-NVMM, "but then the system will run very slowly – that all the time to encrypt and decrypt data.


"Instead, we developed an algorithm for identifying data is not needed by the processor. This allows us to keep the 78% of main memory are encrypted during normal operation, and slows only system performance on 3.7 percent. "


The i-NVMM also has two additional benefits. First, its algorithm also detects inactivity. This means that people are currently not in use-such as your credit card number--is encrypted automatically. This makes the i-NVMM even more secure than DRAM. Second, while 78 percent of main memory is encrypted when the computer is in use, the remaining 22 percent is encrypted when the computer is turned off.


"Basically, unless someone is accessing your computer when you use it, all data is protected," said Solihin.


I-NVMM relies on the cryptographic engine integrated within the memory module is a stand-alone computer, does not require changes to your computer's processors. This interpretation can be used with different processors and systems.


"We are now looking for partners in the industry who are interested in this technology," said Solihin.


The paper, "i-NVMM: a secure non-volatile memory system key with encryption are cumulative," June 6, International Symposium on computer architecture (ISCA) in San Jose, Calif. paper was surgeon by Dr. Siddhartha Chhabra, ph d student. Former NC State. Research supported, in part, by the National Science Foundation.

Ultimate Zip Cracker Software Download

Sunday, February 6

Hardware, software, to help protect operating systems from attack

Ultimate Zip Cracker Software Download

ScienceDaily (January 27, 2011) operating system (OS) is the backbone of your PC. If the operating system is compromised, attackers can take over your computer or crash it. Now researchers at the University of North Carolina have developed an efficient system that utilizes hardware and software to restore the operating system if it is attacked.

In each issue are security attacks where the outside party successfully compromises a computer application (such as a Web browser) and then uses the application to access the operating system. For example, the compromised application could result in "system call" operating system, effectively asking the operating system to perform a particular function. However, instead of routine function, the attacker will use the system call to try to gain control of the operating system.

"Our goal is to give the ability to survive such attacks, the operating system," says Dr. Yan Solihin, Professor of the partner computer engineering and power in NC co-author of a paper describing the new system. "Our approach has three elements: the attack detection; Security fault isolation; And recovery. "

The idea is to take a picture of the operating system while strategies points (such as system calls or interrupts), when functioning as usual, then, if attacked the operating system, to delete what they did since the picture was taken last "good" – effectively back in time before attacking OS. The engine also allows the operating system to identify the source of the attack and isolate it, so the operating system will no longer be vulnerable to attacks from the same application.

The idea of identifying attacks, re-setting system into safe mode is a well-known technique for restoring the normal functions of the system after a failure, but this is the first time that researchers have developed a system with the security element of fault isolation. This critical component prevents the operating system to attack it ???????? over and over again.

The idea of taking images of the operating system and using it to replace the operating system if it is a candidate was previously viewed as practical, because taking these images, and running the system such as significantly slowdown your computer operating speeds. "But we've developed the hardware support that allows the operating system to combine these elements of survival more efficiently, so they take up less time and energy," says Solihin. Researchers say survival system takes up less than 5 percent of the operating system overhead.

The paper, "an architectural Framework for operating system support, survival" was co-authored Solihin, student NC State ph. d. Former Jiang Xiaowei. The paper will be February 16 at IEEE International Convention on the high-performance computer architecture in San Antonio, Texas. The research supported, in part, by the National Science Foundation.

NC State Department of Electrical engineering methods computer is part of the College of engineering of the University.

E-mail or share this story:


Story source:

The story above printed (with adapting to editing by the team of the day-to-day science) materials provided by the of the University of North Carolina.

Note: you mentioned when not composing, source is created instead.

Disclaimer: views expressed in this article do not necessarily reflect those of its employees or ScienceDaily.

Ultimate Zip Cracker Software Download