On 18 Apr 2024, at 13:40, Demi Marie Obenour <demioben...@gmail.com> wrote:
> 
> 
> How does time protection handle these two cases?
> 
> 1. Untrusted code can request a service from trusted code that involves
>   processing sensitive data, and this request may take an unbounded
>   amount of time.  In this case, it is not possible to pad the time
>   actually consumed to the maximum possible value, because the maximum
>   possible value does not exist. […]

that’s an *algorithmic* timing channel (and therefore requires different 
approaches).
Time protection is about *microarchitectural* timing channels.
Please check the paper on what threats it addresses: 
https://trustworthy.systems/publications/abstracts/Ge_YCH_19.abstract

> 2. Operations on sensitive data must be able to consume all available
>   CPU resources.  The main example I can think of is human-interactive
>   systems.  These may be so heavily oversubscribed that it is simply
>   not possible to statically allocate resources to different security
>   domains.  Instead, even security domains involving sensitive data
>   must be able to compete with each other.

this isn’t a microarchitectural channel either.

Gernot

_______________________________________________
Devel mailing list -- devel@sel4.systems
To unsubscribe send an email to devel-leave@sel4.systems

Reply via email to