DocumentCode :
129939
Title :
Real-Time Systems Security through Scheduler Constraints
Author :
Mohan, Swati ; Man Ki Yoon ; Pellizzoni, Rodolfo ; Bobba, Rakesh
Author_Institution :
Inf. Trust Inst., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear :
2014
fDate :
8-11 July 2014
Firstpage :
129
Lastpage :
140
Abstract :
Real-time systems (RTS) were typically considered to be invulnerable to external attacks, mainly due to their use of proprietary hardware and protocols, as well as physical isolation. As a result, RTS and security have traditionally been separate domains. These assumptions are being challenged by a series of recent events that highlight the vulnerabilities in RTS. In this paper we focus on integrating security as a first class principle in the design of RTS: we show that certain security requirements can be specified as real-time scheduling constraints. Using information leakage as a motivating problem, we illustrate our techniques with fixed-priority (FP) real-time schedulers. We evaluate our approach and discuss tradeoffs. Our evaluation shows that many real-time task sets can be scheduled under the proposed constraints without significant performance impact.
Keywords :
real-time systems; scheduling; security of data; FP real-time scheduler; RTS; fixed-priority real-time scheduler; information leakage; integrating security; physical isolation; proprietary hardware; protocols; real-time scheduling constraint; real-time systems security; scheduler constraints; security requirements; Process control; Real-time systems; Receivers; Scheduling algorithms; Security; Switches; Timing; embedded security; information leakage; real-time security; scheduling; timing attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Real-Time Systems (ECRTS), 2014 26th Euromicro Conference on
Conference_Location :
Madrid
Print_ISBN :
978-1-4799-5797-2
Type :
conf
DOI :
10.1109/ECRTS.2014.28
Filename :
6932596
Link To Document :
بازگشت