Information Leakage as a Scheduling Resource - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Information Leakage as a Scheduling Resource

Résumé

High-security processes have to load confidential information into shared resources as part of their operation. This confidential information may be leaked (directly or indirectly) to low-security processes via the shared resource. This paper considers leakage from high-security to low-security processes from the perspective of scheduling. The workflow model is here extended to support preemption, security levels, and leakage. Formalization of leakage properties is then built upon this extended model, allowing formal reasoning about the security of schedulers. Several heuristics are presented in the form of compositional preprocessors and postprocessors as part of a more general scheduling approach. The effectiveness of such heuristics are evaluated experimentally, showing them to achieve significantly better schedulability than the state of the art. Modeling of leakage from cache attacks is presented as a case study.
Fichier principal
Vignette du fichier
main.pdf (161.69 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01382052 , version 1 (15-10-2016)
hal-01382052 , version 2 (07-07-2017)

Identifiants

  • HAL Id : hal-01382052 , version 2

Citer

Fabrizio Biondi, Mounir Chadli, Thomas Given-Wilson, Axel Legay. Information Leakage as a Scheduling Resource. International Workshop on Formal Methods for Industrial Critical Systems and Automated Verification of Critical Systems, Sep 2017, Turin, Italy. ⟨hal-01382052v2⟩
392 Consultations
387 Téléchargements

Partager

Gmail Facebook X LinkedIn More