Time protection: the missing OS abstraction

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authors

Colleges, School and Institutes

External organisations

  • Data61 CSIRO
  • The University of Adelaide
  • University of New South Wales (UNSW)

Abstract

Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code. Preventing unauthorised information flow is a core duty of the operating system, however, present OSes are unable to prevent timing channels. We argue that OSes must provide time protection, the temporal equivalent of the established memory protection, for isolating security domains. We examine the requirements of time protection, present a design and its implementation in the seL4 microkernel, and evaluate efficacy and cost on x86 and Arm processors.

Details

Original languageEnglish
Title of host publicationProceedings of the Fourteenth EuroSys Conference 2019 (EuroSys '19)
Publication statusPublished - 25 Mar 2019
Event14th European Conference on Computer Systems (EuroSys 2019) - Dresden, Germany
Duration: 25 Mar 201928 Mar 2019

Conference

Conference14th European Conference on Computer Systems (EuroSys 2019)
CountryGermany
CityDresden
Period25/03/1928/03/19

Keywords

  • timing channels, covert channels, temporal isolation, time protection, microkernels, security, confidentiality, seL4