Proceedings of the 2018 International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2018)

How to Protect Your Secret in Memory

Authors
Hongwei Zhou, Jinhui Yuan
Corresponding Author
Hongwei Zhou
Available Online March 2018.
DOI
https://doi.org/10.2991/mecae-18.2018.143How to use a DOI?
Keywords
Hardware, operating system, privacy, secret.
Abstract
Due to the limitations of computer architecture, any sensitive data is in clear text in the memory. If we enter sensitive data, such as a card password, into a computer, the data is also plaintext. It leaves the window for the adversary to steal your secret. How to protect your secret in the memory? In this paper, we summarize the existing solutions as four kinds, analyzed their advantages and disadvantages. Without changing the hardware, we believe that the necessary modification to the operating system is a more appropriate solution to protect the secret in the memory.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Cite this article

TY  - CONF
AU  - Hongwei Zhou
AU  - Jinhui Yuan
PY  - 2018/03
DA  - 2018/03
TI  - How to Protect Your Secret in Memory
BT  - Proceedings of the 2018 International Conference on Mechanical, Electronic, Control and Automation Engineering (MECAE 2018)
PB  - Atlantis Press
SP  - 195
EP  - 199
SN  - 2352-5401
UR  - https://doi.org/10.2991/mecae-18.2018.143
DO  - https://doi.org/10.2991/mecae-18.2018.143
ID  - Zhou2018/03
ER  -