Covert Channels in Information Security: Lecture 40
Welcome to the 'Information Security 5 Secure Systems Engineering' course! This lecture explores the concept of covert channels, emphasizing their implications in microarchitecture.

NPTEL-NOC IITM
7.6K views β’ May 6, 2019

About this video
Welcome to 'Information Security 5 Secure Systems Engineering' course !
This lecture delves into the world of covert channels, focusing on how microarchitectural features, specifically cache memory, can be exploited to bypass traditional security measures. It starts by revisiting information flow policies like Bell-LaPadula and BIBA, emphasizing their limitations in the face of covert channels. The lecture then explains the concept of cache covert channels, showcasing how seemingly isolated processes can communicate by strategically accessing shared cache lines. It provides an example of a cache covert channel, demonstrating how data can be transmitted through cache timing variations. The lecture concludes by discussing the challenges of identifying and mitigating covert channels and introducing the notion of communication rate as a metric for quantifying their severity. Viewers will gain an understanding of how subtle hardware interactions can create security loopholes and the need for comprehensive security analyses that consider covert channel vulnerabilities.
NPTEL Courses permit certifications that can be used for Course Credits in Indian Universities as per the UGC and AICTE notifications.
To understand various certification options for this course, please visit https://nptel.ac.in/courses/106106199
#CovertChannels #MicroarchitecturalAttacks #CacheCovertChannels #InformationFlowPolicies #CacheMemory #BellLaPadula #BIBA #CommunicationRate
This lecture delves into the world of covert channels, focusing on how microarchitectural features, specifically cache memory, can be exploited to bypass traditional security measures. It starts by revisiting information flow policies like Bell-LaPadula and BIBA, emphasizing their limitations in the face of covert channels. The lecture then explains the concept of cache covert channels, showcasing how seemingly isolated processes can communicate by strategically accessing shared cache lines. It provides an example of a cache covert channel, demonstrating how data can be transmitted through cache timing variations. The lecture concludes by discussing the challenges of identifying and mitigating covert channels and introducing the notion of communication rate as a metric for quantifying their severity. Viewers will gain an understanding of how subtle hardware interactions can create security loopholes and the need for comprehensive security analyses that consider covert channel vulnerabilities.
NPTEL Courses permit certifications that can be used for Course Credits in Indian Universities as per the UGC and AICTE notifications.
To understand various certification options for this course, please visit https://nptel.ac.in/courses/106106199
#CovertChannels #MicroarchitecturalAttacks #CacheCovertChannels #InformationFlowPolicies #CacheMemory #BellLaPadula #BIBA #CommunicationRate
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
7.6K
Likes
53
Duration
22:27
Published
May 6, 2019
User Reviews
4.1
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now