Skip to Main content Skip to Navigation
Conference papers

Information Leakage as a Scheduling Resource

Fabrizio Biondi 1, 2 Mounir Chadli 1 Thomas Given-Wilson 1 Axel Legay 1 
1 TAMIS - Threat Analysis and Mitigation for Information Security
Inria Rennes – Bretagne Atlantique , IRISA-D4 - LANGAGE ET GÉNIE LOGICIEL
Abstract : High-security processes have to load confidential information into shared resources as part of their operation. This confidential information may be leaked (directly or indirectly) to low-security processes via the shared resource. This paper considers leakage from high-security to low-security processes from the perspective of scheduling. The workflow model is here extended to support preemption, security levels, and leakage. Formalization of leakage properties is then built upon this extended model, allowing formal reasoning about the security of schedulers. Several heuristics are presented in the form of compositional preprocessors and postprocessors as part of a more general scheduling approach. The effectiveness of such heuristics are evaluated experimentally, showing them to achieve significantly better schedulability than the state of the art. Modeling of leakage from cache attacks is presented as a case study.
Document type :
Conference papers
Complete list of metadata

Cited literature [25 references]  Display  Hide  Download
Contributor : Thomas Given-Wilson Connect in order to contact the contributor
Submitted on : Friday, July 7, 2017 - 10:43:13 AM
Last modification on : Monday, April 4, 2022 - 9:28:22 AM


Files produced by the author(s)


  • HAL Id : hal-01382052, version 2


Fabrizio Biondi, Mounir Chadli, Thomas Given-Wilson, Axel Legay. Information Leakage as a Scheduling Resource. International Workshop on Formal Methods for Industrial Critical Systems and Automated Verification of Critical Systems, Sep 2017, Turin, Italy. ⟨hal-01382052v2⟩



Record views


Files downloads