Integrating security constraints into fixed priority real-time schedulers

被引:0
|
作者
Sibin Mohan
Man-Ki Yoon
Rodolfo Pellizzoni
Rakesh B. Bobba
机构
[1] University of Illinois at Urbana-Champaign,Information Trust Institute
[2] University of Illinois at Urbana-Champaign,Department of Computer Science
[3] University of Waterloo,Department of Electrical and Computer Engineering
[4] Oregon State University,School of Electrical Engineering and Computer Science
来源
Real-Time Systems | 2016年 / 52卷
关键词
Security; Real-time systems; Scheduling; Fixed priority schedulers; Information leakage; Security for real-time systems;
D O I
暂无
中图分类号
学科分类号
摘要
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security breaches and external attacks. This was mainly due to the use of proprietary hardware and protocols in such systems along with physical isolation. Hence, security and RTS were considered to be separate domains. This assumption is being challenged by recent events that highlight the vulnerabilities in such systems. In this paper, we focus on how to integrate security as a first-class principle in the design of RTS. We demonstrate how certain security requirements can be cast as real-time scheduling constraints. We use information leakage as a motivating problem to illustrate our techniques and focus on the class of fixed-priority real-time schedulers. We evaluate our approach both analytically as well as using simulations and discuss the tradeoffs in using such an approach. Our work shows that many real-time task sets can be scheduled using our methods without significant performance impact.
引用
收藏
页码:644 / 674
页数:30
相关论文
共 50 条
  • [31] Integrating fault recovery and quality of security in real-time systems
    Bellam, Kiranmai
    Zong, Ziliang
    Alghamdi, Mohammed. I.
    Nijim, Mais
    Qin, Xiao
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 500 - +
  • [32] An adaptive DVS checkpointing scheme for fixed-priority tasks with reliability constraints in dependable real-time embedded systems
    Kim, Kyong Hoon
    Kim, Jong
    EMBEDDED SOFTWARE AND SYSTEMS, PROCEEDINGS, 2007, 4523 : 560 - +
  • [33] Formal development of real-time. priority-based schedulers
    Seceleanu, CC
    12TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2005, : 263 - 270
  • [34] Response time analysis for fixed priority real-time systems with energy-harvesting
    Abdeddaim, Yasmina
    Chandarli, Younes
    Davis, Robert I.
    Masson, Damien
    REAL-TIME SYSTEMS, 2016, 52 (02) : 125 - 160
  • [35] An FPTAS for Response Time Analysis of Fixed Priority Real-Time Tasks with Resource Augmentation
    Thi Huyen Chau Nguyen
    Richard, Pascal
    Grolleau, Emmanuel
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (07) : 1805 - 1818
  • [36] Maintaining integrity constraints and security in real-time database systems
    Ahmed, QN
    Vrbsky, SV
    INTEGRITY AND INTERNAL CONTROL IN INFORMATION SYSTEMS, 1998, : 255 - 269
  • [37] Response time analysis for fixed priority real-time systems with energy-harvesting
    Yasmina Abdeddaïm
    Younès Chandarli
    Robert I. Davis
    Damien Masson
    Real-Time Systems, 2016, 52 : 125 - 160
  • [38] Response Time Stochastic Analysis for Fixed-Priority Stable Real-Time Systems
    Zagalo, Kevin
    Abdeddaim, Yasmina
    Bar-Hen, Avner
    Cucu-Grosjean, Liliana
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (01) : 3 - 14
  • [39] An efficient response-time analysis for real-time transactions with fixed priority assignment
    Rahni, Ahmed
    Grolleau, Emmanuel
    Richard, Michael
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2009, 5 (03) : 197 - 209
  • [40] Integrating Priority with Share in the Priority-Based Weighted Fair Queuing Scheduler for Real-Time Networks
    Song Wang
    Yu-Chung Wang
    Kwei-Jay Lin
    Real-Time Systems, 2002, 22 : 119 - 149