2016 PDP Labsticc
2016 PDP Labsticc
I. I NTRODUCTION
objective of saturating the system or decreasing the performance of other applications needing these resources.
Leakage of information: A compromised application sharing resources with other applications could launch leakage of
information attacks and more specifically cache SCA [8][9].
In fact, the cache forms a shared resource that all applications
compete for. While the data stored in the cache is protected by
the MMU, the memory accesses patterns of the applications
using the cache are not fully protected and can be analyzed
by malicious applications in order to extract information.
IV. N EW ALMOS OS SERVICES ABLE TO DYNAMICALLY
CREATE SECURE ZONES PHYSICALLY ISOLATING
SENSITIVE APPLICATIONS
3 clusters SZ
4 clusters SZ
104
Processor cycles
2.5
2
1.5
1
0.5
0
LM
or S
ig ec
in ur
al ity
ap z
pl on
ic e
at cr
io e
n ati
m on
ap v
pi s
Ta
ng
sk
s
m
a
M
pp
Sy
em
in
ste
g
or
y
m
al
at
lo
ic
ca
m
tio
on
Pe
n
ito
rio
rin
di
g
c
up
m
da
on
te
ito
rin
g
up
da
te
Sc
he
du
lin
g
V. R ESULTS
In order to efficiently address the early evaluation of the
new OS services an evaluation tool targeting the ALMOS OS
and TSAR many-core architecture has been developed [13].
This tool is used in order to compare the original ALMOS
services with the security enhanced ALMOS services on the
TSAR many-core architecture. This latter is composed of 44
clusters, each containing 4 cores (i.e. 64 cores in total). The
main objective in these experimentations is to evaluate the
impact of the creation of secure zones in terms of performance
overhead induced on the isolated application as well as on
the entire execution, both taking into account the overhead on
the OS services. In this work, we use synthetic applications
whose task graphs are representative of parallelism oriented
applications. Each application encompasses 12 tasks running
in parallel (12 cores are necessary to achieve one application
maximum parallelism). Each task corresponds to 2k core instructions. The applications are duplicated in order to stress the
platform. Finally, for these experimentations, the simulation
time is up to 17 seconds for 150 000 000 processor cycles
simulated.
Performance overhead results:
In this subsection, different scenarios are evaluated to measure
the performance overhead induced by the extension of the
ALMOS OS services, in each running application and in terms
of global system performance.
1. Comparison of the complexity of each ALMOS services
for two scenarios: first one single application running on
the platform with no security mechanism, and secondly the
same application being physically isolated. This, according
to the size of one isolated application secure zone (Figure
2): The new application mapping when there is no security
mechanisms, secure zone creation, tasks mapping and memory allocation complexities depend on the isolation scenario.
The time spent on these three services is lower than the
original ALMOS services with any security mechanisms. The
secure zone creation is less complex than ALMOS application
mapping since there is no load on the architecture. As a
consequence, this is the best case of the secure zone creation
algorithm. On the other hand, when there are several possible
clusters each one just as good as the others, as in this case,
2 clusters SZ
105
ALMOS services without security
ALMOS with security mechanisms
Processor cycles
8
6
4
2
0
10
20
Processor cycles
1.5
109
ALMOS services without security
ALMOS with security mechanisms
0.5
1
5
10
20
Number of applications running on the platform
Fig. 4. Comparison of the execution time of non-isolated applications with and without
security mechanisms according to the number of applications running on load of the
platform when a single application is physically isolated in a 4 clusters secure zone