On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
Pcspoof: Compromising the safety of time-triggered ethernet
Designers are increasingly using mixed-criticality networks in embedded systems to reduce
size, weight, power, and cost. Perhaps the most successful of these technologies is Time …
size, weight, power, and cost. Perhaps the most successful of these technologies is Time …
Schedguard: Protecting against schedule leaks using linux containers
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …
Impact of priority assignment on schedule-based attacks in real-time embedded systems
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
Schedguard++: Protecting against schedule leaks using linux containers on multi-core processors
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous
driving system. It has been recently shown that these systems can be vulnerable to timing …
driving system. It has been recently shown that these systems can be vulnerable to timing …
Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
Work-in-progress: Victim-aware scheduling for robust operations in safety-critical systems
D Zhu, S Drager, M Anderson… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
With ever-increasing attacks against learning-enabled components (LECs) in safety-critical
systems, it has become more challenging to ensure robust operations. By focusing on …
systems, it has become more challenging to ensure robust operations. By focusing on …
Scheduler side-channels in preemptive real-time systems: Attack and defense techniques
CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
Intrusion Detection and Localization for Networked Embedded Control Systems
Closed-loop control systems employ continuous sensing and actuation to maintain
controlled variables within preset bounds and achieve the desired system output. Intentional …
controlled variables within preset bounds and achieve the desired system output. Intentional …
[PDF][PDF] Scheduling Obfuscation: Analyzing the Endeavor of Deterring Timing Inference Attacks on Real-Time Systems
S Langer - 2020 - cs.fau.de
Scheduling Obfuscation: Analyzing the Endeavor of Deterring Timing Inference Attacks on
Real-Time Systems Page 1 Scheduling Obfuscation: Analyzing the Endeavor of Deterring …
Real-Time Systems Page 1 Scheduling Obfuscation: Analyzing the Endeavor of Deterring …