[PDF][PDF] Schedule-based side-channel attack in fixed-priority real-time systems

CY Chen, A Ghassami, S Nagy, MK Yoon, S Mohan… - 2015 - ideals.illinois.edu
… on hard real-time systems designed around fixed priority … In this work we propose a schedule
reconstruction algorithm … We implemented the ScheduLeak algorithm on an ARMbased …

On scheduler side-channels in dynamic-priority real-time systems

CY Chen, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2020 - arxiv.org
… demonstrated recently for fixed-priority real-time systems (RTS)… DyPS algorithms outperform
the ScheduLeak algorithms in … [Step 1] Reconstruct φo: the first step is to reconstruct the …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - … IEEE Real-Time and …, 2019 - ieeexplore.ieee.org
fixed-priority real-time systemsschedules, the presence of multiple other tasks in the system
and the typical constraints (eg, deadlines) in the design of RTS. Our ScheduLeak algorithms

A reconnaissance attack mechanism for fixed-priority real-time systems

CY Chen, AE Ghassami, S Mohan, N Kiyavash… - arXiv preprint arXiv …, 2017 - arxiv.org
… the schedule of fixed-priority, preemptive hard real-time systems … of algorithms capable of
reconstructing the schedule of the … system’s task schedule, we propose “ScheduLeak”, a novel …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
… exact schedule of a periodic task system can be reconstructed … proposed the ScheduLeak
algorithms that can infer the exact … most real-time systems in which a preemptive, fixed-priority

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
… [16] developed techniques to reconstruct the task schedule of RTS so targeted … Fixed priority
Single core … (such as ScheduLeak [16]) by preventing untrusted tasks from executing during …

Scheduler side-channels in preemptive real-time systems: Attack and defense techniques

CY Chen - 2020 - ideals.illinois.edu
… -known system parameters is insufficient to reconstruct the future … Figure 3.1: Overview of the
work (using fixed-priority RTS as … task (in user space) can use the ScheduLeak algorithms to …

A covert queueing channel in fcfs schedulers

AE Ghassami, N Kiyavash - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
… information including exact schedules of real-time systems [6], … side channel in an FCFS
scheduler is analyzed in [12]. The … the leakage for several common scheduling policies. Most of …