Undermining isolation through covert channels in the fiasco.OC microkernel

1Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

System designers have come to recognize the merits of building critical systems on top of small kernels for their ability to provide strong isolation at system level. This is due to the fact that enforceable isolation is the prerequisite for any reasonable security policy. Towards this goal we examine some internals of Fiasco.OC, a microkernel of the prominent L4 family. Despite its recent success in certain highsecurity projects for governmental use, we prove that Fiasco.OC is not suited to ensure strict isolation between components meant to be separated. Unfortunately, in addition to the construction of system-wide denial of service attacks, our identified weaknesses of Fiasco.OC also allow covert channels across security perimeters with high bandwidth. We verified our results in a strong affirmative way through many practical experiments. Indeed, for all potential use cases of Fiasco.OC we implemented a full-fledged system on its respective archetypical hardware: Desktop server/workstation on AMD64 x86 CPU, Tablet on Intel Atom CPU, Smartphone on ARM Cortex A9 CPU. The measured peak channel capacities ranging from ∼13,500 bits/s (Cortex-A9 device) to ∼30,500 bits/s (desktop system) clearly falsify Fiasco.OC’s isolation guarantee.

Cite

CITATION STYLE

APA

Peter, M., Petschick, M., Vetter, J., Nordholz, J., Danisevskis, J., & Seifert, J. P. (2015). Undermining isolation through covert channels in the fiasco.OC microkernel. In Lecture Notes in Electrical Engineering (Vol. 363, pp. 147–156). Springer Verlag. https://doi.org/10.1007/978-3-319-22635-4_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free