Work in progress: Exploring schedule-based side-channels in trustzone-enabled real-time systems

MA Aguida, M Hasan - 2022 IEEE 28th Real-Time and …, 2022 - ieeexplore.ieee.org
Our research demonstrates the existence of side-channel information leaks in TrustZone-
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …

Indistinguishability prevents scheduler side channels in real-time systems

CY Chen, D Sanyal, S Mohan - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …

Schedguard: Protecting against schedule leaks using linux containers

J Chen, T Kloda, A Bansal, R Tabish… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …

Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks

J Ren, Z Wang, C Lin, MS Obaidat, H Xie… - … on Network Science …, 2023 - ieeexplore.ieee.org
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …

Securing time in untrusted operating systems with timeseal

FM Anwar, L Garcia, X Han… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …

Work-in-progress: Rws-a roulette wheel scheduler for preventing execution pattern leakage

Y Zhang, L Wang, W Jiang… - 2018 IEEE Real-Time and …, 2018 - ieeexplore.ieee.org
Many real-time systems are safety-critical, where reliability is crucial. Under traditional
scheduling mechanism, the execution patterns of the tasks on such system can be easily …

Reorder: Securing dynamic-priority real-time systems using schedule obfuscation

CY Chen, M Hasan, AE Ghassami, S Mohan… - arXiv preprint arXiv …, 2018 - arxiv.org
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …

Defending Real-Time Systems through Timing-Aware Designs

T Mishra - 2022 - vtechworks.lib.vt.edu
Real-time computing systems are those that are designed to achieve computing goals by
certain deadlines. Real-time computing systems are present in everything from cars to …

Facing the Safety-Security Gap in RTES: the Challenge of Timeliness

M Volp, D Kozhaya, P Verissimo - … Real-Time Systems (CERTS 2017) co …, 2017 - orbilu.uni.lu
Safety-critical real-time systems, including real-time cyber-physical and industrial control
systems, need not be solely correct but also timely. Untimely (stale) results may have severe …