Real-Time Systems Security through Scheduler Constraints

Sibin Mohan, Man Ki Yoon, Rodolfo Pellizzoni, Rakesh Bobba

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Real-time systems (RTS) were typically considered to be invulnerable to external attacks, mainly due to their use of proprietary hardware and protocols, as well as physical isolation. As a result, RTS and security have traditionally been separate domains. These assumptions are being challenged by a series of recent events that highlight the vulnerabilities in RTS. In this paper we focus on integrating security as a first class principle in the design of RTS: we show that certain security requirements can be specified as real-time scheduling constraints. Using information leakage as a motivating problem, we illustrate our techniques with fixed-priority (FP) real-time schedulers. We evaluate our approach and discuss tradeoffs. Our evaluation shows that many real-time task sets can be scheduled under the proposed constraints without significant performance impact.

Original languageEnglish (US)
Title of host publicationProceedings - Euromicro Conference on Real-Time Systems
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages129-140
Number of pages12
ISBN (Electronic)9781479957989
DOIs
StatePublished - Oct 21 2014
Event26th Euromicro Conference on Real-Time Systems, ECRTS 2014 - Madrid, Spain
Duration: Jul 8 2014Jul 11 2014

Publication series

NameProceedings - Euromicro Conference on Real-Time Systems
ISSN (Print)1068-3070

Other

Other26th Euromicro Conference on Real-Time Systems, ECRTS 2014
Country/TerritorySpain
CityMadrid
Period7/8/147/11/14

Keywords

  • embedded security
  • information leakage
  • real-time security
  • scheduling
  • timing attacks

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Real-Time Systems Security through Scheduler Constraints'. Together they form a unique fingerprint.

Cite this