21st IEEE Real-Time and Embedded Technology and Applications Symposium 2015
DOI: 10.1109/rtas.2015.7108450
|View full text |Cite
|
Sign up to set email alerts
|

A generalized model for preventing information leakage in hard real-time systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
76
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 43 publications
(76 citation statements)
references
References 22 publications
0
76
0
Order By: Relevance
“…The task sets are grouped by CPU utilization from [0.001+0.1·x, 0.1+0.1·x] where 0 ≤ x ≤ 9. Each utilization group consists of 6 subgroups that have a fixed number of tasks (5,7,9,11,13,15). Each subgroup contains 100 task sets.…”
Section: Performance Evaluation and Design Space Exploration A mentioning
confidence: 99%
“…The task sets are grouped by CPU utilization from [0.001+0.1·x, 0.1+0.1·x] where 0 ≤ x ≤ 9. Each utilization group consists of 6 subgroups that have a fixed number of tasks (5,7,9,11,13,15). Each subgroup contains 100 task sets.…”
Section: Performance Evaluation and Design Space Exploration A mentioning
confidence: 99%
“…The authors introduced a modification to the fixedpriority scheduling algorithm and a state cleanup mechanism to mitigate information leakage through shared resources. This work was further extended to a more generalized task model [17]. Nonetheless, such countermeasures may not be completely effective against timing inference attacks that focus on the deterministic scheduling behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Despite the fact that malware developers and sophisticated adversaries are able to overcome air-gaps, most RTS were considered to be invulnerable against software security breaches; and until recently security issues in RTS were not extensively discussed in industry or academia. The issues regarding information leakage through storage timing channels using architectural resources (e.g., caches) shared between real-time tasks with different security levels is considered in the work [8], [9]. The authors proposed a modification to the fixedpriority scheduling algorithm and introduced a state cleanup mechanism to mitigate information leakage through shared resources.…”
Section: Related Workmentioning
confidence: 99%