On scheduler side-channels in dynamic-priority real-time systems

CY Chen, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2020 - arxiv.org
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …

Scheduler side-channels in preemptive real-time systems: Attack and defense techniques

CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …

Indistinguishability prevents scheduler side channels in real-time systems

CY Chen, D Sanyal, S Mohan - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …

Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks

J Ren, Z Wang, C Lin, MS Obaidat, H Xie… - … on Network Science …, 2023 - ieeexplore.ieee.org
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …

Job-class-level fixed priority scheduling of weakly-hard real-time systems

H Choi, H Kim, Q Zhu - 2019 IEEE Real-Time and Embedded …, 2019 - ieeexplore.ieee.org
Many cyber-physical applications including sensing and control operations can tolerate a
certain degree of timing violations as long as the number of the violations are predictably …

Reorder: Securing dynamic-priority real-time systems using schedule obfuscation

CY Chen, M Hasan, AE Ghassami, S Mohan… - arXiv preprint arXiv …, 2018 - arxiv.org
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …

Work in progress: Exploring schedule-based side-channels in trustzone-enabled real-time systems

MA Aguida, M Hasan - 2022 IEEE 28th Real-Time and …, 2022 - ieeexplore.ieee.org
Our research demonstrates the existence of side-channel information leaks in TrustZone-
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …

Application of deep learning for predicting schedules in real-time systems

KH Kim - 2018 - ideals.illinois.edu
Hard real-time systems are often used in safety critical systems: a task missing a deadline
can be catastrophic for the system and endanger human lives. To guarantee that it meets …

Schedguard: Protecting against schedule leaks using linux containers

J Chen, T Kloda, A Bansal, R Tabish… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …