Exploring opportunistic execution for integrating security into legacy hard real-time systems

M Hasan, S Mohan, RB Bobba… - 2016 IEEE Real-Time …, 2016 - ieeexplore.ieee.org
2016 IEEE Real-Time Systems Symposium (RTSS), 2016ieeexplore.ieee.org
Due to physical isolation as well as use of proprietary hardware and protocols, traditional
real-time systems (RTS) were considered to be invulnerable to security breaches and
external attacks. This assumption is being challenged by recent attacks that highlight
vulnerabilities in RTS. Besides, a straightforward integration of security mechanisms might
compromise the safety and predictability guarantees of such systems. In this paper, we focus
on integrating security mechanisms into RTS (especially legacy RTS) and define a metric to …
Due to physical isolation as well as use of proprietary hardware and protocols, traditional real-time systems (RTS) were considered to be invulnerable to security breaches and external attacks. This assumption is being challenged by recent attacks that highlight vulnerabilities in RTS. Besides, a straightforward integration of security mechanisms might compromise the safety and predictability guarantees of such systems. In this paper, we focus on integrating security mechanisms into RTS (especially legacy RTS) and define a metric to measure the effectiveness of such integration. We combine opportunistic execution with hierarchical scheduling to maintain compatibility with legacy systems while still providing flexibility. The proposed approach is shown to increase the security posture of RTS without impacting their temporal (and hence, safety) constraints.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果