Application of deep learning for predicting schedules in real-time systems

KH Kim - 2018 - ideals.illinois.edu
Hard real-time systems are often used in safety critical systems: a task missing a deadline
can be catastrophic for the system and endanger human lives. To guarantee that it meets …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …

Scheduler side-channels in preemptive real-time systems: Attack and defense techniques

CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …

Schedguard: Protecting against schedule leaks using linux containers

J Chen, T Kloda, A Bansal, R Tabish… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …

A reconnaissance attack mechanism for fixed-priority real-time systems

CY Chen, AE Ghassami, S Mohan, N Kiyavash… - arXiv preprint arXiv …, 2017 - arxiv.org
In real-time embedded systems (RTS), failures due to security breaches can cause serious
damage to the system, the environment and/or injury to humans. Therefore, it is very …

On scheduler side-channels in dynamic-priority real-time systems

CY Chen, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2020 - arxiv.org
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

[引用][C] DeepSniffer: An Attention-based Neural Network for Real-time Schedule Interception

A Farhangi, Z Guo

Reorder: Securing dynamic-priority real-time systems using schedule obfuscation

CY Chen, M Hasan, AE Ghassami, S Mohan… - arXiv preprint arXiv …, 2018 - arxiv.org
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …

Randomization as mitigation of directed timing inference based attacks on time-triggered real-time systems with task replication

K Krüger, N Vreman, R Pates, M Maggio, M Völp… - 2021 - drops.dagstuhl.de
Time-triggered real-time systems achieve deterministic behavior using schedules that are
constructed offline, based on scheduling constraints. Their deterministic behavior makes …