Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling

Autor: Deian Stefan, Amit Levy, Pablo Buiras, David Mazières, Edward Yang, Alejandro Russo, David Terei
Rok vydání: 2013
Předmět:
Zdroj: Lecture Notes in Computer Science ISBN: 9783642402029
ESORICS
DOI: 10.1007/978-3-642-40203-6_40
Popis: Information flow control allows untrusted code to access sensitive and trustworthy information without leaking this information. However, the presence of covert channels subverts this security mechanism, allowing processes to communicate information in violation of IFC policies. In this paper, we show that concurrent deterministic IFC systems that use time-based scheduling are vulnerable to a cache-based internal timing channel. We demonstrate this vulnerability with a concrete attack on Hails, one particular IFC web framework. To eliminate this internal timing channel, we implement instruction-based scheduling, a new kind of scheduler that is indifferent to timing perturbations from underlying hardware components, such as the cache, TLB, and CPU buses. We show this scheduler is secure against cache-based internal timing attacks for applications using a single CPU. To show the feasibility of instruction-based scheduling, we have implemented a version of Hails that uses the CPU retired-instruction counters available on commodity Intel and AMD hardware. We show that instruction-based scheduling does not impose significant performance penalties. Additionally, we formally prove that our modifications to Hails’ underlying IFC system preserve non-interference in the presence of caches.
Databáze: OpenAIRE