Undermining Isolation Through Covert Channels in the Fiasco.OC Microkernel

被引:1
|
作者
Peter, M. [1 ]
Petschick, M. [1 ]
Vetter, J. [1 ]
Nordholz, J. [1 ]
Danisevskis, J. [1 ]
Seifert, J. -P. [1 ]
机构
[1] TU Berlin, D-10587 Berlin, Germany
来源
关键词
D O I
10.1007/978-3-319-22635-4_13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
System designers have come to recognize the merits of building critical systems on top of small kernels for their ability to provide strong isolation at system level. This is due to the fact that enforceable isolation is the prerequisite for any reasonable security policy. Towards this goal we examine some internals of Fiasco.OC, a microkernel of the prominent L4 family. Despite its recent success in certain high-security projects for governmental use, we prove that Fiasco.OC is not suited to ensure strict isolation between components meant to be separated. Unfortunately, in addition to the construction of system-wide denial of service attacks, our identified weaknesses of Fiasco.OC also allow covert channels across security perimeters with high bandwidth. We verified our results in a strong affirmative way through many practical experiments. Indeed, for all potential use cases of Fiasco.OC we implemented a full-fledged system on its respective archetypical hardware: Desktop server/workstation on AMD64 x86 CPU, Tablet on Intel Atom CPU, Smartphone on ARM Cortex A9 CPU. The measured peak channel capacities ranging from similar to 13,500 bits/s (Cortex-A9 device) to similar to 30,500 bits/s (desktop system) clearly falsify Fiasco. OC's isolation guarantee.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 18 条
  • [1] Probabilistic Obfuscation through Covert Channels
    Stephens, Jon
    Yadegari, Babak
    Collberg, Christian
    Debray, Saumya
    Scheidegger, Carlos
    2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 243 - 257
  • [2] Statistical covert channels through PROXY server
    Galatenko, A
    Grusho, A
    Kniazev, A
    Timonina, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 424 - 429
  • [3] Covert communications through mobile voice channels
    Kazemi, Reza
    Rezaei, Roohollah
    Akhaee, Mohammad A.
    Behnia, Fereidoon
    IET INFORMATION SECURITY, 2016, 10 (03) : 156 - 164
  • [4] Enhancing Integrity of Modbus TCP Through Covert Channels
    Taylor, James M., Jr.
    Sharif, Hamid R.
    2017 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2017,
  • [5] Understanding and Mitigating Covert Channels Through Branch Predictors
    Evtyushkin, Dmitry
    Ponomarev, Dmitry
    Abu-Ghazaleh, Nael
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2016, 13 (01)
  • [6] Investigating HTTP Covert Channels Through Fuzz Testing
    Holk, Kai
    Mazurczyk, Wojciech
    Zuppelli, Marco
    Caviglione, Luca
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [7] Covert channels in IoT deployments through data hiding techniques
    Migliardi, Mauro
    Merlo, Alessio
    Caviglione, Luca
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 559 - 563
  • [8] Robust authentication for automotive control networks through covert channels
    Vanderhallen, Stien
    Van Bulck, Jo
    Piessens, Frank
    Muhlberg, Jan Tobias
    COMPUTER NETWORKS, 2021, 193
  • [9] Secrets Leaking Through Quicksand: Covert Channels in Approximate Computing
    Masciullo, Lorenzo
    Passerone, Roberto
    Regazzoni, Francesco
    Polian, Ilia
    2023 IEEE EUROPEAN TEST SYMPOSIUM, ETS, 2023,
  • [10] Time's a Thief of Memory Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels
    Mishra, Nimish
    Chakraborty, Anirban
    Chatterjee, Urbi
    Mukhopadhyay, Debdeep
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2022, 2023, 13820 : 3 - 24