학술논문

Real-Time Systems Security through Scheduler Constraints
Document Type
Conference
Source
2014 26th Euromicro Conference on Real-Time Systems Real-Time Systems (ECRTS), 2014 26th Euromicro Conference on. :129-140 Jul, 2014
Subject
Computing and Processing
Security
Real-time systems
Process control
Timing
Switches
Scheduling algorithms
Receivers
real-time security
scheduling
information leakage
timing attacks
embedded security
Language
ISSN
1068-3070
2377-5998
Abstract
Real-time systems (RTS) were typically considered to be invulnerable to external attacks, mainly due to their use of proprietary hardware and protocols, as well as physical isolation. As a result, RTS and security have traditionally been separate domains. These assumptions are being challenged by a series of recent events that highlight the vulnerabilities in RTS. In this paper we focus on integrating security as a first class principle in the design of RTS: we show that certain security requirements can be specified as real-time scheduling constraints. Using information leakage as a motivating problem, we illustrate our techniques with fixed-priority (FP) real-time schedulers. We evaluate our approach and discuss tradeoffs. Our evaluation shows that many real-time task sets can be scheduled under the proposed constraints without significant performance impact.