Core Scheduling - Taming Hyper-Threads to Be Secure
Offered By: Linux Plumbers Conference via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk from the Linux Plumbers Conference that delves into the development, testing, and profiling efforts of core scheduling in the Linux community. Learn about the concept of core scheduling as a solution to security vulnerabilities in CPU architecture, particularly those targeting hyperthreading (SMT). Discover how this approach aims to keep SMT enabled while ensuring that only mutually trusted applications run concurrently on a core. Examine various proof-of-concept designs, their implementation details, and performance implications. Gain insights into the profiling techniques used to assess the correctness and performance of core scheduling patches, including the use of kernel features for obtaining time-sensitive data. Understand the challenges in defining security boundaries, policy implementation, and performance optimization in core scheduling. Analyze early performance results and explore future directions for this critical security feature in Linux systems.
Syllabus
Intro
A brief history of side-channel attacks
Core Scheduling: Concepts
Core Scheduling : task match
Core Scheduling: History
Core Scheduling: KVM based approach
Core Scheduling Generic Approach
Core Scheduling Implementation details
Core Scheduling: Iterations
Core Scheduling: Implementation Issues
Core Scheduling: vruntime comparison
Vruntime comparison corner cases after normalization
Forced idle corner case example
Proposed Solutions
Testing methodology
Co-scheduling stats example
Performance validation
Early performance results: CPU
Early performance results: mixed resources
Core Scheduling : Post v3 and beyond
Taught by
Linux Plumbers Conference
Related Courses
Blockchain Scalability and its Foundations in Distributed SystemsThe University of Sydney via Coursera Cloud Security Scanner: Qwik Start
Google via Google Cloud Skills Boost OWASP Top 10 - 2021
Cybrary Secure Development, Programming, and Coding with Veracode
Cybrary Risk Management and Security Vulnerabilities
Coventry University via FutureLearn