Schedguard++: Protecting against schedule leaks using linux containers on multi-core processors

J Chen, T Kloda, R Tabish, A Bansal, CY Chen… - ACM Transactions on …, 2023 - dl.acm.org
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous
driving system. It has been recently shown that these systems can be vulnerable to timing …

Defense against microarchitecture side-channel attacks through runtime detection, isolation and prevention

A Javeed - 2022 - research.sabanciuniv.edu
Over the course of recent years, microarchitectural side-channel attacks emerged as one of
the most novel and thought-provoking attacks to exfiltrate information from a computing …

Logs and side channels

HB Lee - 2023 - ideals.illinois.edu
While system administrators would prefer to configure their systems so that their loggers
capture as much details as possible, such details may include sensitive information. In …

Who's Afraid of Butterflies? A Close Examination of the Butterfly Attack

S Baruah, P Ekberg, M Hosseinzadeh… - 2023 IEEE Real …, 2023 - ieeexplore.ieee.org
The Butterfly Attack, introduced in an RTSS 2019 paper, was billed as a new kind of timing
attack against control loops in cyber-physical systems. We conduct a close inspection of the …

Hardware Specification Aware Timing Side Channel Security Analysis

P Chakraborty, T Suha, S Bhunia - 2023 IEEE 36th …, 2023 - ieeexplore.ieee.org
Most software programs in modern Internet-of-Things (IoT) systems in diverse domains such
as healthcare, smart cities, banking, and industrial automation deal with secret data/assets …

Secure Analytics for Embedded Systems through Machine Learning Applications using TrustZones

C Rookard, A Crabtree, JD Trujillo… - 2022 IEEE 13th …, 2022 - ieeexplore.ieee.org
With the advent of edge computing, there has been a substantial growth of connected
devices. Several of these devices, including internet-of-things (IoT), smartphones …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

A New Covert Channel in Fixed-Priority Real-Time Multiframe Tasks

MF Babar, M Hasan - 2024 IEEE 27th International Symposium …, 2024 - ieeexplore.ieee.org
This study investigates the presence of illicit information flows in fixed-priority multiframe real-
time systems. We identify an algorithmic covert channel (called FrameLeaker) that enables a …

Retrofitting the partially privileged mode for TEE communication channel protection

J Jang, BB Kang - IEEE Transactions on Dependable and …, 2018 - ieeexplore.ieee.org
ARM TrustZone provides a Trusted Execution Environment (TEE) to isolate security-critical
services, which are generally invoked from the Rich Execution Environment (REE) through a …

Thermware: Toward side-channel defense for tiny iot devices

N Garg, I Shahid, E Avllazagaj, J Hill, J Han… - Proceedings of the 24th …, 2023 - dl.acm.org
As malware in IoT devices flourishes, defenses are lacking. Traditional antivirus or intrusion
detection-based defense techniques fail for the limited computational capabilities and the …