Empirical Evaluation of Memory-Erasure Protocols
Reynaldo Gil-Pons, Sjouke Mauw, Rolando Trujillo-Rasua
2025
Abstract
Software-based memory-erasure protocols are two-party communication protocols where a verifier instructs a computational device to erase its memory and send a proof of erasure. They aim at guaranteeing that low-cost IoT devices are free of malware by putting them back into a safe state without requiring secure hardware or physical manipulation of the device. Several software-based memory-erasure protocols have been introduced and theoretically analysed. Yet, many of them have not been tested for their feasibility, performance and security on real devices, which hinders their industry adoption. This article reports on the first empirical analysis of software-based memory-erasure protocols with respect to their security, erasure guarantees, and performance. The experimental setup consists of 3 modern IoT devices with different computational capabilities, 7 protocols, 6 hash-function implementations, and various performance and security criteria. Our results indicate that existing software-based memory-erasure protocols are feasible, although slow devices may take several seconds to erase their memory and generate a proof of erasure. We found that no protocol dominates across all empirical settings, defined by the computational power and memory size of the device, the network speed, and the required level of security. Interestingly, network speed and hidden constants within the protocol specification played a more prominent role in the performance of these protocols than anticipated based on the related literature. We provide an evaluation framework that, given a desired level of security, determines which protocols offer the best trade-off between performance and erasure guarantees.
DownloadPaper Citation
in Harvard Style
Gil-Pons R., Mauw S. and Trujillo-Rasua R. (2025). Empirical Evaluation of Memory-Erasure Protocols. In Proceedings of the 22nd International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-760-3, SciTePress, pages 209-220. DOI: 10.5220/0013554800003979
in Bibtex Style
@conference{secrypt25,
author={Reynaldo Gil-Pons and Sjouke Mauw and Rolando Trujillo-Rasua},
title={Empirical Evaluation of Memory-Erasure Protocols},
booktitle={Proceedings of the 22nd International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2025},
pages={209-220},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013554800003979},
isbn={978-989-758-760-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 22nd International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - Empirical Evaluation of Memory-Erasure Protocols
SN - 978-989-758-760-3
AU - Gil-Pons R.
AU - Mauw S.
AU - Trujillo-Rasua R.
PY - 2025
SP - 209
EP - 220
DO - 10.5220/0013554800003979
PB - SciTePress