Title
Real-Time Systems Security through Scheduler Constraints
Abstract
Real-time systems (RTS) were typically considered to be invulnerable to external attacks, mainly due to their use of proprietary hardware and protocols, as well as physical isolation. As a result, RTS and security have traditionally been separate domains. These assumptions are being challenged by a series of recent events that highlight the vulnerabilities in RTS. In this paper we focus on integrating security as a first class principle in the design of RTS: we show that certain security requirements can be specified as real-time scheduling constraints. Using information leakage as a motivating problem, we illustrate our techniques with fixed-priority (FP) real-time schedulers. We evaluate our approach and discuss tradeoffs. Our evaluation shows that many real-time task sets can be scheduled under the proposed constraints without significant performance impact.
Year
DOI
Venue
2014
10.1109/ECRTS.2014.28
Real-Time Systems
Keywords
Field
DocType
real-time systems,scheduling,security of data,FP real-time scheduler,RTS,fixed-priority real-time scheduler,information leakage,integrating security,physical isolation,proprietary hardware,protocols,real-time scheduling constraint,real-time systems security,scheduler constraints,security requirements,embedded security,information leakage,real-time security,scheduling,timing attacks
Proprietary hardware,Information leakage,Computer science,Scheduling (computing),Timing attack,Real-time computing,First class,Process control,Embedded security,Embedded system,Distributed computing,Vulnerability
Conference
ISSN
Citations 
PageRank 
1068-3070
15
0.65
References 
Authors
22
4
Name
Order
Citations
PageRank
Sibin Mohan1150.65
Man Ki Yoon2162.36
Rodolfo Pellizzoni3421.84
Rakesh Bobba4150.65