Work in progress: Exploring schedule-based side-channels in trustzone-enabled real-time systems
Our research demonstrates the existence of side-channel information leaks in TrustZone-
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …
A novel side-channel in real-time schedulers
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …
real-time systems (RTS); examples of such systems can be found in automotive systems …
Indistinguishability prevents scheduler side channels in real-time systems
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …
serious threats to many safety-critical applications. The main culprit is the inherent …
Schedguard: Protecting against schedule leaks using linux containers
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
Securing time in untrusted operating systems with timeseal
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
Work-in-progress: Rws-a roulette wheel scheduler for preventing execution pattern leakage
Y Zhang, L Wang, W Jiang… - 2018 IEEE Real-Time and …, 2018 - ieeexplore.ieee.org
Many real-time systems are safety-critical, where reliability is crucial. Under traditional
scheduling mechanism, the execution patterns of the tasks on such system can be easily …
scheduling mechanism, the execution patterns of the tasks on such system can be easily …
Reorder: Securing dynamic-priority real-time systems using schedule obfuscation
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …
say, to launch side channel attacks or even destabilize the system by denying access to …
Defending Real-Time Systems through Timing-Aware Designs
T Mishra - 2022 - vtechworks.lib.vt.edu
Real-time computing systems are those that are designed to achieve computing goals by
certain deadlines. Real-time computing systems are present in everything from cars to …
certain deadlines. Real-time computing systems are present in everything from cars to …
Facing the Safety-Security Gap in RTES: the Challenge of Timeliness
Safety-critical real-time systems, including real-time cyber-physical and industrial control
systems, need not be solely correct but also timely. Untimely (stale) results may have severe …
systems, need not be solely correct but also timely. Untimely (stale) results may have severe …