2015
DOI: 10.48550/arxiv.1508.05228
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Case Study on Covert Channel Establishment via Software Caches in High-Assurance Computing Systems

Abstract: Covert channels can be utilized to secretly deliver information from high privileged processes to low privileged processes in the context of a high-assurance computing system. In this case study, we investigate the possibility of covert channel establishment via software caches in the context of a framework for component-based operating systems. While component-based operating systems offer security through the encapsulation of system service processes, complete isolation of these processes is not reasonably f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…For example, Brumley [7] and Schmidt et al [32] describe pollution of cache lines as a countermeasure against cache-based covert channels. We show that CPU load noise has a significant impact on the throughput of our covert channel and is therefore usable as a countermeasure.…”
Section: Countermeasuresmentioning
confidence: 99%
“…For example, Brumley [7] and Schmidt et al [32] describe pollution of cache lines as a countermeasure against cache-based covert channels. We show that CPU load noise has a significant impact on the throughput of our covert channel and is therefore usable as a countermeasure.…”
Section: Countermeasuresmentioning
confidence: 99%