Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems

Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Due to physical isolation as well as use of proprietary hardware and protocols, traditional real-time systems (RTS) were considered to be invulnerable to security breaches and external attacks. This assumption is being challenged by recent attacks that highlight vulnerabilities in RTS. Besides, a straightforward integration of security mechanisms might compromise the safety and predictability guarantees of such systems. In this paper, we focus on integrating security mechanisms into RTS (especially legacy RTS) and define a metric to measure the effectiveness of such integration. We combine opportunistic execution with hierarchical scheduling to maintain compatibility with legacy systems while still providing flexibility. The proposed approach is shown to increase the security posture of RTS without impacting their temporal (and hence, safety) constraints.

Original languageEnglish (US)
Title of host publicationProceedings - 2016 IEEE Real-Time Systems Symposium, RTSS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages123-134
Number of pages12
ISBN (Electronic)9781509053025
DOIs
StatePublished - Jul 2 2016
Event2016 IEEE Real-Time Systems Symposium, RTSS 2016 - Porto, Portugal
Duration: Nov 29 2016Dec 2 2016

Publication series

NameProceedings - Real-Time Systems Symposium
Volume0
ISSN (Print)1052-8725

Other

Other2016 IEEE Real-Time Systems Symposium, RTSS 2016
CountryPortugal
CityPorto
Period11/29/1612/2/16

Keywords

  • Convex Optimization
  • Fixed-priority scheduling
  • Geometric Programming
  • Hierarchical scheduling
  • RTS
  • Security
  • server

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems'. Together they form a unique fingerprint.

Cite this