2017
DOI: 10.1007/978-3-319-67113-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Information Leakage as a Scheduling Resource

Abstract: High-security processes have to load confidential information into shared resources as part of their operation. This confidential information may be leaked (directly or indirectly) to low-security processes via the shared resource. This paper considers leakage from high-security to low-security processes from the perspective of scheduling. The workflow model is here extended to support preemption, security levels, and leakage. Formalization of leakage properties is then built upon this extended model, allowing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…• Scheduling-based Obfuscation [6], [125], [130] • Leakage Feedback [126], [131] [132] • Server Side Defenses (cache Flushing) [116] • Retired Instruction [119] • Minimum Timeslice [114] • Cache Flushing [6], [115], [116] Partitioning-Time Countermeasure Techniques (Section8.4)…”
Section: Llcmentioning
confidence: 99%
See 1 more Smart Citation
“…• Scheduling-based Obfuscation [6], [125], [130] • Leakage Feedback [126], [131] [132] • Server Side Defenses (cache Flushing) [116] • Retired Instruction [119] • Minimum Timeslice [114] • Cache Flushing [6], [115], [116] Partitioning-Time Countermeasure Techniques (Section8.4)…”
Section: Llcmentioning
confidence: 99%
“…Schedulers can be designed such that the information leakage can be quantified to be used as feedback to suppress it. The authors in [126] follow a workflow model used in real-time systems in which jobs are periodically produced to be scheduled and to be completed before assigned deadlines. The tasks are divided into steps that individually consist of three parameters: execution time, leakage value and security level.…”
Section: Leakage Feedbackmentioning
confidence: 99%