When multiple job processes are served by a single scheduler, the queueing delays of one process are often affected by the others, resulting in a timing side channel that leaks the arrival pattern of one process to the others. In this work, we study such a timing side channel between a regular user and a malicious attacker. Utilizing Shannon’s mutual information as a measure of information leakage between the user and attacker, we analyze privacy-preserving behaviors of common work-conserving schedulers. We find that the attacker can always learn perfectly the user’s arrival process in a longest-queue-first (LQF) scheduler. When the user’s job arrival rate is very low (near zero), first-come-first-serve (FCFS) and round robin schedulers bot...
International audienceQuantitative information flow analyses measure how much information on secrets...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
Traditionally, scheduling policies have been optimized to perform well on metrics such as throughput...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
Abstract—We study the privacy compromise due to a queuing side channel which arises when a resource ...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious...
Schedules define how resources process jobs in diverse domains, reaching from healthcare to transpor...
International audienceQuantitative information flow analyses measure how much information on secrets...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
Timing side channels in two-user schedulers are studied. When two users share a scheduler, one user ...
Abstract—In this work, we study information leakage in timing side channels that arise in the contex...
Traditionally, scheduling policies have been optimized to perform well on metrics such as throughput...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
Abstract—We study the privacy compromise due to a queuing side channel which arises when a resource ...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
International audienceQuantitative information flow analyses measure how much information on secrets...
Covert- and side-channel attacks, typically enabled by the usage of shared resources, pose a serious...
Schedules define how resources process jobs in diverse domains, reaching from healthcare to transpor...
International audienceQuantitative information flow analyses measure how much information on secrets...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
Control systems can be vulnerable to security threats where an attacker gathers information about th...