Empirical Evaluation of Memory-Erasure Protocols

📅 2025-09-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing empirical evaluations of software-based memory erasure protocols for IoT devices lack rigor, particularly given the widespread absence of secure hardware support in such devices. Method: This paper presents the first systematic evaluation of seven software memory erasure protocols across seven real-world IoT device classes. We design a comprehensive evaluation framework assessing security guarantees, erasure assurance, and multidimensional performance—including latency, bandwidth consumption, and computational overhead—and quantify protocol behavior across heterogeneous devices using multiple hash implementations. Results: Protocol performance is strongly influenced by device computational capability, network bandwidth, and protocol-specific hidden constants. No single protocol dominates all dimensions; optimal selection requires trade-offs between security assurance levels and deployment constraints. Notably, several protocols achieve full memory erasure and generate verifiable proofs within seconds. This work establishes the first empirical benchmark and practical selection guidelines for deploying software-based memory erasure protocols in industrial IoT settings.

Technology Category

Application Category

📝 Abstract
Software-based memory-erasure protocols are two-party communication protocols where a verifier instructs a computational device to erase its memory and send a proof of erasure. They aim at guaranteeing that low-cost IoT devices are free of malware by putting them back into a safe state without requiring secure hardware or physical manipulation of the device. Several software-based memory-erasure protocols have been introduced and theoretically analysed. Yet, many of them have not been tested for their feasibility, performance and security on real devices, which hinders their industry adoption. This article reports on the first empirical analysis of software-based memory-erasure protocols with respect to their security, erasure guarantees, and performance. The experimental setup consists of 3 modern IoT devices with different computational capabilities, 7 protocols, 6 hash-function implementations, and various performance and security criteria. Our results indicate that existing software-based memory-erasure protocols are feasible, although slow devices may take several seconds to erase their memory and generate a proof of erasure. We found that no protocol dominates across all empirical settings, defined by the computational power and memory size of the device, the network speed, and the required level of security. Interestingly, network speed and hidden constants within the protocol specification played a more prominent role in the performance of these protocols than anticipated based on the related literature. We provide an evaluation framework that, given a desired level of security, determines which protocols offer the best trade-off between performance and erasure guarantees.
Problem

Research questions and friction points this paper is trying to address.

Empirically evaluating software-based memory-erasure protocols' feasibility
Testing protocols' security and performance on real IoT devices
Determining optimal protocol trade-offs for different security levels
Innovation

Methods, ideas, or system contributions that make the work stand out.

Empirical analysis of software-based memory-erasure protocols
Evaluation framework for security-performance trade-offs
Testing protocols on diverse IoT device configurations
🔎 Similar Papers
No similar papers found.
R
Reynaldo Gil-Pons
University of Luxembourg, 6 Avenue de la Fonte, Belval, Luxembourg
Sjouke Mauw
Sjouke Mauw
Professor in Security and Trust of Software Systems, University of Luxembourg
securitytrustformal methodscomputer science
R
Rolando Trujillo-Rasua
Universitat Rovira i Virgili, 26 Avinguda dels Països Catalans, Tarragona, Spain