Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …
with external environments, the real-time systems are facing more and more security …
Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
Impact of priority assignment on schedule-based attacks in real-time embedded systems
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
Integrating security constraints into fixed priority real-time schedulers
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
A reconnaissance attack mechanism for fixed-priority real-time systems
In real-time embedded systems (RTS), failures due to security breaches can cause serious
damage to the system, the environment and/or injury to humans. Therefore, it is very …
damage to the system, the environment and/or injury to humans. Therefore, it is very …
Work-in-progress: Rws-a roulette wheel scheduler for preventing execution pattern leakage
Y Zhang, L Wang, W Jiang… - 2018 IEEE Real-Time and …, 2018 - ieeexplore.ieee.org
Many real-time systems are safety-critical, where reliability is crucial. Under traditional
scheduling mechanism, the execution patterns of the tasks on such system can be easily …
scheduling mechanism, the execution patterns of the tasks on such system can be easily …
Maximizing the security level of real-time software while preserving temporal constraints
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …
(IoT) and edge computing domains, where they are often employed as the control entity of a …
SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Partitioned Real-Time Scheduling for Preventing Information Leakage
D Kang, I Jung, K Lee, H Baek - IEEE Access, 2022 - ieeexplore.ieee.org
Recent real-time systems have been gradually connected externally through the Internet. As
each subsystem constituting a system has been developed from different vendors, the …
each subsystem constituting a system has been developed from different vendors, the …