On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

Pcspoof: Compromising the safety of time-triggered ethernet

A Loveless, LTX Phan, R Dreslinski… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Designers are increasingly using mixed-criticality networks in embedded systems to reduce
size, weight, power, and cost. Perhaps the most successful of these technologies is Time …

Schedguard: Protecting against schedule leaks using linux containers

J Chen, T Kloda, A Bansal, R Tabish… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
Real-time systems have recently been shown to be vulnerable to timing inference attacks,
mainly due to their predictable behavioral patterns. Existing solutions such as schedule …

Impact of priority assignment on schedule-based attacks in real-time embedded systems

SY Karin, H Aydin, D Zhu, S Drager… - Journal of Systems …, 2023 - Elsevier
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …

Schedguard++: Protecting against schedule leaks using linux containers on multi-core processors

J Chen, T Kloda, R Tabish, A Bansal, CY Chen… - ACM Transactions on …, 2023 - dl.acm.org
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous
driving system. It has been recently shown that these systems can be vulnerable to timing …

Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks

J Ren, Z Wang, C Lin, MS Obaidat, H Xie… - … on Network Science …, 2023 - ieeexplore.ieee.org
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …

Work-in-progress: Victim-aware scheduling for robust operations in safety-critical systems

D Zhu, S Drager, M Anderson… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
With ever-increasing attacks against learning-enabled components (LECs) in safety-critical
systems, it has become more challenging to ensure robust operations. By focusing on …

Scheduler side-channels in preemptive real-time systems: Attack and defense techniques

CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …

Intrusion Detection and Localization for Networked Embedded Control Systems

V Lesi, M Juliato, S Ahmed, C Gutierrez… - arXiv preprint arXiv …, 2021 - arxiv.org
Closed-loop control systems employ continuous sensing and actuation to maintain
controlled variables within preset bounds and achieve the desired system output. Intentional …

[PDF][PDF] Scheduling Obfuscation: Analyzing the Endeavor of Deterring Timing Inference Attacks on Real-Time Systems

S Langer - 2020 - cs.fau.de
Scheduling Obfuscation: Analyzing the Endeavor of Deterring Timing Inference Attacks on
Real-Time Systems Page 1 Scheduling Obfuscation: Analyzing the Endeavor of Deterring …