Horsch, JulianJulianHorschHuber, ManuelManuelHuberWessel, SaschaSaschaWessel2022-03-149.7.20202017https://publica.fraunhofer.de/handle/publica/40211610.24406/publica-r-40211610.1109/Trustcom/BigDataSE/ICESS.2017.232Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. In this paper, we present TransCrypt, a concept for transparent and guest-agnostic, dynamic kernel and user main memory encryption using a custom minimal hypervisor. The concept utilizes the address translation features provided by hardware-based virtualization support of modern CPUs to restrict the guest to a small working set of recently accessed physical pages. The rest of the pages, which constitute the majority of memory, remain securely encrypted. Furthermore, we present a transparent and guest-agnostic mechanism for recognizing pages to be excluded from encryption to still ensure correct system functionality, for example, for pages shared with peripheral devices. The detailed evaluation using our fully functional prototype on an ARM Cortex-A15 development board running Android shows that TransCrypt is able to effectively protect secrets in memory while keeping the p erformance impact small. For example, the system is able to keep the E-mail account password of a typical user in the Android mail app's memory encrypted 98.99% of the time, while still reaching 81.7% and 99.8% of native performance in different benchmarks.enRAM encryptionMain Memory EncryptionARM hypervisorCold Boot AttackDMAandroid003005006518TransCrypt: Transparent main memory encryption using a minimal ARM hypervisorconference paper