Information Leakage as a Scheduling Resource - Archive ouverte HAL Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2016

Information Leakage as a Scheduling Resource

Résumé

High-security processes typically have to load confidential information, such as encryption keys or private data, into memory as part of their operation. In systems with a single shared memory, when high-security processes are switched out due to context switching, confidential information may remain in memory and be accessible to low-security processes. This paper considers this problem from the perspective of scheduling. A formal model supporting preemption is introduced that allows: reasoning about leakage between high-and low-security processes, and producing information-leakage aware schedulers. Several information-leakage aware heuristics are presented in the form of compositional pre-and postprocessors as part of a more general scheduling approach. The effectiveness of such heuristics is evaluated experimentally, showing them to achieve significantly better schedulability than the state of the art.
Fichier principal
Vignette du fichier
main.pdf (284.98 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01382052 , version 1 (15-10-2016)
hal-01382052 , version 2 (07-07-2017)

Identifiants

  • HAL Id : hal-01382052 , version 1

Citer

Fabrizio Biondi, Mounir Chadli, Thomas Given-Wilson, Axel Legay. Information Leakage as a Scheduling Resource. 2016. ⟨hal-01382052v1⟩
396 Consultations
388 Téléchargements

Partager

Gmail Facebook X LinkedIn More