Minimizing side-channel attack vulnerability via schedule randomization

N Vreman, R Pates, K Krüger, G Fohler… - 2019 IEEE 58th …, 2019 - ieeexplore.ieee.org
Control systems can be vulnerable to security threats where an attacker gathers information
about the execution of the system. In particular, side-channel attacks exploit the predictability …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …

Vulnerability of controller area network to schedule-based attacks

S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …

Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks

J Ren, Z Wang, C Lin, MS Obaidat, H Xie… - … on Network Science …, 2023 - ieeexplore.ieee.org
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …

Butterfly attack: Adversarial manipulation of temporal properties of cyber-physical systems

R Mahfouzi, A Aminifar, S Samii… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
Increasing internet connectivity poses an existential threat for cyber-physical systems.
Securing these safety-critical systems becomes an important challenge. Cyber-physical …

Schedguard: Protecting against schedule leaks using linux containers

J Chen, T Kloda, A Bansal, R Tabish… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …

Online Distributed Schedule Randomization to Mitigate Timing Attacks in Industrial Control Systems

A Samaddar, A Easwaran - ACM Transactions on Embedded Computing …, 2023 - dl.acm.org
Industrial control systems (ICSs) consist of a large number of control applications that are
associated with periodic real-time flows with hard deadlines. To facilitate large-scale …

Impact of priority assignment on schedule-based attacks in real-time embedded systems

SY Karin, H Aydin, D Zhu, S Drager… - Journal of Systems …, 2023 - Elsevier
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …