On scheduler side-channels in dynamic-priority real-time systems
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …
Scheduler side-channels in preemptive real-time systems: Attack and defense techniques
CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
A novel side-channel in real-time schedulers
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …
real-time systems (RTS); examples of such systems can be found in automotive systems …
Indistinguishability prevents scheduler side channels in real-time systems
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …
serious threats to many safety-critical applications. The main culprit is the inherent …
Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
Job-class-level fixed priority scheduling of weakly-hard real-time systems
Many cyber-physical applications including sensing and control operations can tolerate a
certain degree of timing violations as long as the number of the violations are predictably …
certain degree of timing violations as long as the number of the violations are predictably …
Reorder: Securing dynamic-priority real-time systems using schedule obfuscation
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …
say, to launch side channel attacks or even destabilize the system by denying access to …
Work in progress: Exploring schedule-based side-channels in trustzone-enabled real-time systems
Our research demonstrates the existence of side-channel information leaks in TrustZone-
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …
Application of deep learning for predicting schedules in real-time systems
KH Kim - 2018 - ideals.illinois.edu
Hard real-time systems are often used in safety critical systems: a task missing a deadline
can be catastrophic for the system and endanger human lives. To guarantee that it meets …
can be catastrophic for the system and endanger human lives. To guarantee that it meets …
Schedguard: Protecting against schedule leaks using linux containers
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …