Virtualization technology is nowadays adopted in security-critical embedded
systems to achieve higher performance and more design flexibility. However, it
also comes with new security threats, where attackers leverage timing covert
channels to exfiltrate sensitive information from a partition using a trojan.

360 Mobile Vision - 360mobilevision.com North & South Carolina Security products and Systems Installations for Commercial and Residential - $55 Hourly Rate. ACCESS CONTROL, INTRUSION ALARM, ACCESS CONTROLLED GATES, INTERCOMS AND CCTV INSTALL OR REPAIR 360 Mobile Vision - 360mobilevision.com is committed to excellence in every aspect of our business. We uphold a standard of integrity bound by fairness, honesty and personal responsibility. Our distinction is the quality of service we bring to our customers. Accurate knowledge of our trade combined with ability is what makes us true professionals. Above all, we are watchful of our customers interests, and make their concerns the basis of our business.

This paper presents a novel approach for the experimental assessment of
timing covert channels in embedded hypervisors, with a case study on security
assessment of a commercial hypervisor product (Wind River VxWorks MILS), in
cooperation with a licensed laboratory for the Common Criteria security
certification. Our experimental analysis shows that it is indeed possible to
establish a timing covert channel, and that the approach is useful for system
designers for assessing that their configuration is robust against this kind of
information leakage.

By admin