Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

A novel side-channel in real-time schedulers

CY Chen, S Mohan, R Pellizzoni… - 2019 IEEE Real …, 2019 - ieeexplore.ieee.org
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

[PDF][PDF] Schedule-based side-channel attack in fixed-priority real-time systems

CY Chen, A Ghassami, S Nagy, MK Yoon, S Mohan… - 2015 - ideals.illinois.edu
Security failures in real-time embedded systems can have catastrophic effects and can lead
to injury to (or even loss of life for) humans, damage to the system and also environmental …

Polyrhythm: Adaptive tuning of a multi-channel attack template for timing interference

A Li, M Sudvarg, H Liu, Z Yu, C Gill… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
As cyber-physical systems have become increasingly complex, rising computational
demand has led to the ubiquitous use of multicore processors in embedded environments …

Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems

K Krüger, M Volp, G Fohler - Leibniz International Proceedings in …, 2018 - orbilu.uni.lu
Much effort has been put into improving the predictability of real-time systems, especially in
safety-critical environments, which provides designers with a rich set of methods and tools to …

Real-time systems security through scheduler constraints

S Mohan, MK Yoon, R Pellizzoni… - 2014 26th Euromicro …, 2014 - ieeexplore.ieee.org
Real-time systems (RTS) were typically considered to be invulnerable to external attacks,
mainly due to their use of proprietary hardware and protocols, as well as physical isolation …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

On-demand time blurring to support side-channel defense

W Liu, D Gao, MK Reiter - … ESORICS 2017: 22nd European Symposium on …, 2017 - Springer
Side-channel attacks are a serious threat to multi-tenant public clouds. Past work showed
how secret information in one virtual machine (VM) can be leaked to another, co-resident …

Exploring opportunistic execution for integrating security into legacy hard real-time systems

M Hasan, S Mohan, RB Bobba… - 2016 IEEE Real-Time …, 2016 - ieeexplore.ieee.org
Due to physical isolation as well as use of proprietary hardware and protocols, traditional
real-time systems (RTS) were considered to be invulnerable to security breaches and …