Hardware Encryption Developed for New Computer Memory Technology

Security concerns are one of the key obstacles to the adoption of new non-volatile main memory (NVMM) technology in next-generation computers, which would improve computer start times and boost memory capacity. But now researchers from North Carolina State University have developed new encryption hardware for use with NVMM to protect personal information and other data.

NVMM technologies, such as phase-change memory, hold great promise to replace conventional dynamic random access memory (DRAM) in the main memory of computers. NVMM would allow computers to start instantly, and can fit more memory into the same amount of space used by existing technologies. However, NVMM poses a security risk.

Conventional DRAM main memory does not store data once the computer is turned off. That means, for example, that it doesn’t store your credit card number and password after an online shopping spree. NVMM, on the other hand, retains all user data in main memory even years after the computer is turned off.

This feature could give criminals access to your personal information or other data if your laptop or smart phone were stolen. And, because the data in the NVMM is stored in main memory, it cannot be encrypted using software. Software cannot manage main memory functions, because software itself operates in main memory.

NC State researchers have developed a solution using a hardware encryption system called i-NVMM. Continue reading…

Related Posts

Tizen 2.0 Alpha code and SDK released The source code and the SDK for Tizen 2.0 alpha has been released. Tizen is a Linux distribution for mobile platforms cobbled together with parts from...
How to set up a Debug Server using Nginx Editor: This article was originally titled Capturing 5xx Errors with a Debug Server and published at the official blog of Nginx. No matter how ri...
CoreOS announces Distributed Trusted Computing for Tectonic Enterprise Today’s vulnerabilities - Heartbleed, Shellshock, Poodle - have a brand. When vulnerabilities have a brand and your favorite companies are making ...
Introducing Distributed Data-structures in R The main goal of the “ddR” package is to provide a simple, generic data-structures, and functions that works across different backends such as R’s “pa...
Keeping a Global Eye on Copyright Law We spend a lot of our time at EFF trying to spot new proposals in copyright across the world, and understanding whether they're good or bad for civil ...
MPAA wants to control your TV The MPAA is pressuring the FCC for the authority to cripple recording devices using so-called "Selectable Output Control" (SOC). Basically, SOC wou...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*