Abstract
Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection, the temporal equivalent of the established memory protection, for isolating security domains. We examine the requirements of time protection, present a design and its implementation in the seL4 microkernel, and evaluate efficacy and cost on x86 and Arm processors.
Original language | English |
---|---|
Title of host publication | EuroSys '19 |
Subtitle of host publication | Proceedings of the Fourteenth EuroSys Conference 2019 |
Publisher | Association for Computing Machinery (ACM) |
Pages | 1-17 |
Number of pages | 17 |
ISBN (Electronic) | 9781450362818 |
DOIs | |
Publication status | Published - 25 Mar 2019 |
Event | 14th European Conference on Computer Systems (EuroSys 2019) - Dresden, Germany Duration: 25 Mar 2019 → 28 Mar 2019 |
Conference
Conference | 14th European Conference on Computer Systems (EuroSys 2019) |
---|---|
Country/Territory | Germany |
City | Dresden |
Period | 25/03/19 → 28/03/19 |
Keywords
- timing channels
- covert channels
- temporal isolation
- time protection
- microkernels
- security
- confidentiality
- seL4
- Timing channels
- Security
- Time protection
- Temporal isolation
- Covert channels
- Confidentiality
- SeL4
- Microkernels
ASJC Scopus subject areas
- Electrical and Electronic Engineering
- Hardware and Architecture