Time Protection: the Missing OS Abstraction

10/12/2018
by   Qian Ge, et al.
0

Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection in addition to the established memory protection. We examine the requirements of time protection, present a design and its implementation in the seL4 microkernel, and evaluate its efficacy as well as performance overhead on Arm and x86 processors.

READ FULL TEXT

page 9

page 10

research
01/24/2019

Can We Prove Time Protection?

Timing channels are a significant and growing security threat in compute...
research
05/29/2021

Revisiting Challenges for Selective Data Protection of Real Applications

Selective data protection is a promising technique to defend against the...
research
05/01/2020

Prevention of Microarchitectural Covert Channels on an Open-Source 64-bit RISC-V Core

Covert channels enable information leakage across security boundaries of...
research
02/24/2022

Systematic Prevention of On-Core Timing Channels by Full Temporal Partitioning

Microarchitectural timing channels enable unwanted information flow acro...
research
03/27/2010

Determinating Timing Channels in Compute Clouds

Timing side-channels represent an insidious security challenge for cloud...
research
04/10/2018

PULP: Inner-process Isolation based on the Program Counter and Data Memory Address

Plenty of in-process vulnerabilities are blamed on various out of bound ...
research
12/04/2018

A small and adaptive coprocessor for information flow tracking in ARM SoCs

DIFT (Dynamic Information Flow Tracking) has been a hot topic for more t...

Please sign up or login with your details

Forgot password? Click here to reset