Minimizing side-channel attack vulnerability via schedule randomization
Control systems can be vulnerable to security threats where an attacker gathers information
about the execution of the system. In particular, side-channel attacks exploit the predictability …
about the execution of the system. In particular, side-channel attacks exploit the predictability …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
A novel side-channel in real-time schedulers
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …
real-time systems (RTS); examples of such systems can be found in automotive systems …
Task parameters analysis in schedule-based timing side-channel attack
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …
Vulnerability of controller area network to schedule-based attacks
S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …
other roadway users. One of the critical functions for safety is the controller area network …
Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
Butterfly attack: Adversarial manipulation of temporal properties of cyber-physical systems
Increasing internet connectivity poses an existential threat for cyber-physical systems.
Securing these safety-critical systems becomes an important challenge. Cyber-physical …
Securing these safety-critical systems becomes an important challenge. Cyber-physical …
Schedguard: Protecting against schedule leaks using linux containers
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
Online Distributed Schedule Randomization to Mitigate Timing Attacks in Industrial Control Systems
A Samaddar, A Easwaran - ACM Transactions on Embedded Computing …, 2023 - dl.acm.org
Industrial control systems (ICSs) consist of a large number of control applications that are
associated with periodic real-time flows with hard deadlines. To facilitate large-scale …
associated with periodic real-time flows with hard deadlines. To facilitate large-scale …
Impact of priority assignment on schedule-based attacks in real-time embedded systems
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …