[PDF][PDF] Schedule-based side-channel attack in fixed-priority real-time systems
… on hard real-time systems designed around fixed priority … In this work we propose a schedule
reconstruction algorithm … We implemented the ScheduLeak algorithm on an ARMbased …
reconstruction algorithm … We implemented the ScheduLeak algorithm on an ARMbased …
On scheduler side-channels in dynamic-priority real-time systems
… demonstrated recently for fixed-priority real-time systems (RTS)… DyPS algorithms outperform
the ScheduLeak algorithms in … [Step 1] Reconstruct φo: the first step is to reconstruct the …
the ScheduLeak algorithms in … [Step 1] Reconstruct φo: the first step is to reconstruct the …
A novel side-channel in real-time schedulers
… fixed-priority real-time systems … schedules, the presence of multiple other tasks in the system
and the typical constraints (eg, deadlines) in the design of RTS. Our ScheduLeak algorithms …
and the typical constraints (eg, deadlines) in the design of RTS. Our ScheduLeak algorithms …
A reconnaissance attack mechanism for fixed-priority real-time systems
… the schedule of fixed-priority, preemptive hard real-time systems … of algorithms capable of
reconstructing the schedule of the … system’s task schedule, we propose “ScheduLeak”, a novel …
reconstructing the schedule of the … system’s task schedule, we propose “ScheduLeak”, a novel …
Task parameters analysis in schedule-based timing side-channel attack
… exact schedule of a periodic task system can be reconstructed … proposed the ScheduLeak
algorithms that can infer the exact … most real-time systems in which a preemptive, fixed-priority …
algorithms that can infer the exact … most real-time systems in which a preemptive, fixed-priority …
SoK: Security in real-time systems
… [16] developed techniques to reconstruct the task schedule of RTS so targeted … Fixed priority
Single core … (such as ScheduLeak [16]) by preventing untrusted tasks from executing during …
Single core … (such as ScheduLeak [16]) by preventing untrusted tasks from executing during …
Scheduler side-channels in preemptive real-time systems: Attack and defense techniques
CY Chen - 2020 - ideals.illinois.edu
… -known system parameters is insufficient to reconstruct the future … Figure 3.1: Overview of the
work (using fixed-priority RTS as … task (in user space) can use the ScheduLeak algorithms to …
work (using fixed-priority RTS as … task (in user space) can use the ScheduLeak algorithms to …
A covert queueing channel in fcfs schedulers
AE Ghassami, N Kiyavash - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
… information including exact schedules of real-time systems [6], … side channel in an FCFS
scheduler is analyzed in [12]. The … the leakage for several common scheduling policies. Most of …
scheduler is analyzed in [12]. The … the leakage for several common scheduling policies. Most of …