• DocumentCode
    644402
  • Title

    A Vulnerability Optimization Method for Security-Critical Real-Time Systems

  • Author

    Xia Zhang ; Jinyu Zhan ; Wei Jiang ; Yue Ma

  • Author_Institution
    Sch. of Inf. & Software Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
  • fYear
    2013
  • fDate
    17-19 July 2013
  • Firstpage
    215
  • Lastpage
    221
  • Abstract
    In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which is based on dynamic programming algorithm, is devised to obtain minimal vulnerability under strict timing constraints. Furthermore, we take task criticality into consideration because each task is not equally important to its system. Finally, simulation experiments demonstrate the effectiveness of this method.
  • Keywords
    distributed processing; dynamic programming; embedded systems; scheduling; security of data; MTVOM method; RC5 algorithm; dynamic programming algorithm; execution time; multiple task vulnerability optimization method; security attacks; security level; security-critical realtime systems; task scheduling problems; timing constraints; vulnerability optimization method; Computers; Encryption; Heuristic algorithms; Optimization; Real-time systems; dynamic programming; real-time system; reliability; security-critical; vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networking, Architecture and Storage (NAS), 2013 IEEE Eighth International Conference on
  • Conference_Location
    Xi´an
  • Type

    conf

  • DOI
    10.1109/NAS.2013.34
  • Filename
    6665366