Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking 1st edition by Dwaine Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh – Ebook PDF Instant Download/Delivery. 3540205920, 978-3540205920
Full download Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking 1st Edition after payment
Product details:
ISBN 10: 3540205920
ISBN 13: 978-3540205920
Author: Dwaine Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). They map multisets of arbitrary finite size to strings (hashes) of fixed length. They are incremental in that, when new members are added to the multiset, the hash can be updated in time proportional to the change. The functions may be multiset-collision resistant in that it is difficult to find two multisets which produce the same hash, or just set-collision resistant in that it is difficult to find a set and a multiset which produce the same hash.
We demonstrate how set-collision resistant multiset hash functions make an existing offline memory integrity checker secure against active adversaries. We improve on this checker such that it can use smaller time stamps without increasing the frequency of checks. The improved checker uses multiset-collision resistant multiset hash functions.
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking 1st Table of contents:
-
Introduction
- 1.1 Overview of Memory Integrity and Its Importance
- 1.2 Introduction to Hash Functions
- 1.3 Motivation for Incremental Multiset Hash Functions
- 1.4 Contributions of the Paper
- 1.5 Paper Organization
-
Preliminaries
- 2.1 Memory Integrity Checking: Key Concepts
- 2.2 Traditional Hash Functions: Properties and Applications
- 2.3 Multiset Hash Functions: Definitions and Use Cases
- 2.4 Incremental Hashing: Motivation and Challenges
- 2.5 Previous Work on Memory Integrity and Hash Functions
-
Incremental Multiset Hash Functions
- 3.1 Definition of Incremental Multiset Hash Functions
- 3.2 Mathematical Properties of Multiset Hashing
- 3.3 Incremental Update Mechanism for Multiset Hashes
- 3.4 Efficiency of Incremental Hashing in Dynamic Environments
- 3.5 Collision Resistance and Security of Incremental Multiset Hash Functions
-
Application to Memory Integrity Checking
- 4.1 Importance of Memory Integrity in Modern Systems
- 4.2 Traditional Approaches to Memory Integrity Checking
- 4.3 How Incremental Multiset Hash Functions Aid in Memory Integrity
- 4.3.1 Real-time Detection of Memory Corruption
- 4.3.2 Efficient Update Mechanisms for Dynamic Memory States
- 4.4 Case Studies: Use in Software and Hardware Systems
- 4.5 Advantages of Incremental Multiset Hashing Over Traditional Methods
-
Performance Evaluation
- 5.1 Experimental Setup and Methodology
- 5.2 Comparison with Traditional Hash Functions
- 5.2.1 Memory Overhead and Computational Efficiency
- 5.2.2 Speed and Real-Time Application
- 5.3 Results from Memory Integrity Checking Scenarios
- 5.4 Scalability and Robustness Analysis
-
Security Analysis
- 6.1 Theoretical Security of Incremental Multiset Hash Functions
- 6.2 Resistance to Common Attacks (e.g., Collision Attacks, Preimage Resistance)
- 6.3 Use in Ensuring Integrity Against Malware and Unauthorized Modifications
- 6.4 Practical Considerations for Secure Implementation
-
Extensions and Generalizations
- 7.1 Application to Other Integrity Checking Scenarios (e.g., File Systems, Databases)
- 7.2 Generalizing to Higher-Dimensional Data Structures
- 7.3 Combination with Other Cryptographic Primitives for Enhanced Security
- 7.4 Future Directions for Incremental Hashing in Integrity Applications
-
Conclusion
- 8.1 Summary of Contributions
- 8.2 Impact on Memory Integrity and Cryptographic Systems
- 8.3 Future Research Directions
People also search for Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking 1st:
an incremental development algebra 2
what is the hash function used in double hashing
hash functions for hash tables
john incremental mode example
qmultihash example