How to Protect Your Secret in Memory
Hongwei Zhou, Jinhui Yuan
Available Online March 2018.
- https://doi.org/10.2991/mecae-18.2018.143How to use a DOI?
- Hardware, operating system, privacy, secret.
- Due to the limitations of computer architecture, any sensitive data is in clear text in the memory. If we enter sensitive data, such as a card password, into a computer, the data is also plaintext. It leaves the window for the adversary to steal your secret. How to protect your secret in the memory? In this paper, we summarize the existing solutions as four kinds, analyzed their advantages and disadvantages. Without changing the hardware, we believe that the necessary modification to the operating system is a more appropriate solution to protect the secret in the memory.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Hongwei Zhou AU - Jinhui Yuan PY - 2018/03 DA - 2018/03 TI - How to Protect Your Secret in Memory BT - Proceedings of the 2018 International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2018) PB - Atlantis Press SP - 195 EP - 199 SN - 2352-5401 UR - https://doi.org/10.2991/mecae-18.2018.143 DO - https://doi.org/10.2991/mecae-18.2018.143 ID - Zhou2018/03 ER -