Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks

J Ren, C Liu, C Lin, R Bi, S Li, Z Wang, Y Qian… - ACM Transactions on …, 2023 - dl.acm.org
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …

Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks

J Ren, Z Wang, C Lin, MS Obaidat, H Xie… - … on Network Science …, 2023 - ieeexplore.ieee.org
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

Impact of priority assignment on schedule-based attacks in real-time embedded systems

SY Karin, H Aydin, D Zhu, S Drager… - Journal of Systems …, 2023 - Elsevier
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …

Integrating security constraints into fixed priority real-time schedulers

S Mohan, MK Yoon, R Pellizzoni, RB Bobba - Real-Time Systems, 2016 - Springer
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …

A reconnaissance attack mechanism for fixed-priority real-time systems

CY Chen, AE Ghassami, S Mohan, N Kiyavash… - arXiv preprint arXiv …, 2017 - arxiv.org
In real-time embedded systems (RTS), failures due to security breaches can cause serious
damage to the system, the environment and/or injury to humans. Therefore, it is very …

Work-in-progress: Rws-a roulette wheel scheduler for preventing execution pattern leakage

Y Zhang, L Wang, W Jiang… - 2018 IEEE Real-Time and …, 2018 - ieeexplore.ieee.org
Many real-time systems are safety-critical, where reliability is crucial. Under traditional
scheduling mechanism, the execution patterns of the tasks on such system can be easily …

Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Partitioned Real-Time Scheduling for Preventing Information Leakage

D Kang, I Jung, K Lee, H Baek - IEEE Access, 2022 - ieeexplore.ieee.org
Recent real-time systems have been gradually connected externally through the Internet. As
each subsystem constituting a system has been developed from different vendors, the …