InfoShield: A Security Architecture for Protecting Information Usage in Memory Conference Paper uri icon


  • Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-volatile memory such as hard disks, for many e-commerce and network applications, sensitive information is often stored as plain-text in main memory. Documented and reported exploits facilitate an adversary stealing sensitive information from an application's memory. These exploits include illegitimate memory scan, information theft oriented buffer over flow, invalid pointer manipulation, integer overflow, password stealing Trojans and so forth. Today's computing system and its hardware cannot address these exploits effectively in a coherent way. This paper presents a unified and lightweight solution, called InfoShield, that can strengthen application protection against theft of sensitive information such as passwords, encryption keys, and other private data with a minimal performance impact. Unlike prior whole memory encryption and information flow based efforts, InfoShield protects the usage of information. InfoShield ensures that sensitive data are used only as defined by application semantics, preventing misuse of information. Comparing with prior art, InfoShield handles a broader range of information theft scenarios in a unified framework with less overhead. Evaluation using popular network client-server applications shows that InfoShield is sound for practical use and incurs little performance loss because InfoShield only protects absolute, critical sensitive information. Based on the profiling results, only 0.3% of memory accesses and 0.2% of executed codes are affected by InfoShield. 2006 IEEE.

name of conference

  • The Twelfth International Symposium on High-Performance Computer Architecture, 2006.

published proceedings

  • The Twelfth International Symposium on High-Performance Computer Architecture, 2006.

altmetric score

  • 3.5

author list (cited authors)

  • Shi, W., Fryman, J. B., Gu, G., Lee, H., Zhang, Y., & Yang, J.

citation count

  • 12

complete list of authors

  • Shi, Weidong||Fryman, Joshua B||Gu, Guofei||Lee, Hsien Hsin S||Zhang, Youtao||Yang, Jun

publication date

  • January 2006