InfoLeak:Scheduling-based information leakage

Vateva-Gurova, T. and Manzoor, S. and Huang, Y. and Suri, Neeraj (2019) InfoLeak:Scheduling-based information leakage. In: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, pp. 44-53. ISBN 9781538657003

Full text not available from this repository.


Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious threat to complex systems such as the Cloud. While their exploitation in the real world depends on properties of the execution environment (e.g., scheduling), the explicit consideration of these factors is often neglected. This paper introduces InfoLeak, an information leakage model that establishes the crucial role of the scheduler for exploiting core-private caches as covert channels. We show, formally and empirically, how the availability of these channels and the corresponding attack feasibility are affected by scheduling. Moreover, our model allows security experts to assess the related threat, posed by core-private cache covert channels for a particular system by considering solely the scheduling information. To validate the utility of InfoLeak, we deploy a covert-channel attack and correlate its success ratio to the scheduling of the attacker processes in the target system. We demonstrate the applicability of the InfoLeak model for analyzing the scheduling information for possible information leakage and also provide an example on its usage.

Item Type:
Contribution in Book/Report/Proceedings
ID Code:
Deposited By:
Deposited On:
15 Oct 2019 10:10
Last Modified:
06 Oct 2021 09:45