Application of deep learning for predicting schedules in real-time systems
KH Kim - 2018 - ideals.illinois.edu
Hard real-time systems are often used in safety critical systems: a task missing a deadline
can be catastrophic for the system and endanger human lives. To guarantee that it meets …
can be catastrophic for the system and endanger human lives. To guarantee that it meets …
A novel side-channel in real-time schedulers
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …
real-time systems (RTS); examples of such systems can be found in automotive systems …
Scheduler side-channels in preemptive real-time systems: Attack and defense techniques
CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
Schedguard: Protecting against schedule leaks using linux containers
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
A reconnaissance attack mechanism for fixed-priority real-time systems
In real-time embedded systems (RTS), failures due to security breaches can cause serious
damage to the system, the environment and/or injury to humans. Therefore, it is very …
damage to the system, the environment and/or injury to humans. Therefore, it is very …
On scheduler side-channels in dynamic-priority real-time systems
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
Reorder: Securing dynamic-priority real-time systems using schedule obfuscation
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …
say, to launch side channel attacks or even destabilize the system by denying access to …
Randomization as mitigation of directed timing inference based attacks on time-triggered real-time systems with task replication
Time-triggered real-time systems achieve deterministic behavior using schedules that are
constructed offline, based on scheduling constraints. Their deterministic behavior makes …
constructed offline, based on scheduling constraints. Their deterministic behavior makes …