SoK: Security in Real-Time Systems

被引:1
|
作者
Hasan, Monowar [1 ]
Kashinath, Ashish [2 ]
Chen, Chien-Ying [2 ]
Mohan, Sibin [3 ]
机构
[1] Washington State Univ, 355 NE Spokane St, Pullman, WA 99164 USA
[2] Univ Illinois, 201 North Goodwin Ave, Urbana, IL 61801 USA
[3] George Washington Univ, 800 22nd St NW, Washington, DC 20052 USA
基金
美国国家科学基金会;
关键词
Embedded systems; cyber-physical systems; scheduling; OPTIMIZATION; ARCHITECTURE; INFORMATION;
D O I
10.1145/3649499
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is an increasing concern for real-time systems (RTS). Over the last decade or so, researchers have demonstrated attacks and defenses aimed at such systems. In this article, we identify, classify and measure the effectiveness of the security research in this domain. We provide a high-level summary [identification] and a taxonomy [classification] of this existing body of work. Furthermore, we carry out an in-depth analysis [measurement] of scheduler-based security techniques - the most common class of real-time security mechanisms. For this purpose, we developed a common metric, "attacker's burden", used to measure the effectiveness of (existing as well as future) scheduler-based real-time security measures. This metric, built on the concept of "work factor" [1], is adapted for, and normalized across, various scheduler-based real-time security techniques.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] Security Issues in Industrial Real-Time Systems
    Al-Jarad, Talhah
    Al Madani, Basem
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 357 - 361
  • [2] Static Security Optimization for Real-Time Systems
    Lin, Man
    Xu, Li
    Yang, Laurence T.
    Qin, Xiao
    Zheng, Nenggan
    Wu, Zhaohui
    Qiu, Meikang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (01) : 22 - 37
  • [3] Real-Time Systems Security Through Scheduler Constraints
    Mohan, Sibin
    Yoon, Man-Ki
    Pellizzoni, Rodolfo
    Bobba, Rakesh
    2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), 2014, : 129 - +
  • [4] Schedulability driven security optimization in real-time systems
    Lin, Man
    Yang, Laurence T.
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 314 - +
  • [5] Supporting timeliness and security in real-time database systems
    Son, SH
    NINTH EUROMICRO WORKSHOP ON REAL TIME SYSTEMS, PROCEEDINGS, 1997, : 266 - 273
  • [6] Guiding the selection of security patterns for real-time systems
    Motii, Anas
    Hamid, Brahim
    Lanusse, Agnes
    Bruel, Jean-Michel
    2016 21ST INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2016), 2016, : 155 - 164
  • [7] Modelling security risks in real-time operating systems
    Kiszka, Jan
    Wagner, Bernardo
    2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130
  • [8] Partial security and timeliness in real-time database systems
    Son, SH
    PARALLEL AND DISTRIBUTED PROCESSING, 1998, 1388 : 1117 - 1120
  • [9] Maintaining security in firm real-time database systems
    Ahmed, QN
    Vrbsky, SV
    14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 83 - 90
  • [10] Analyzing the security and survivability of real-time control systems
    Oman, P
    Krings, A
    de Leon, DC
    Alves-Foss, J
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 342 - 349