Proceedings of the 4th International Workshop on Trustworthy Embedded Devices 2014
DOI: 10.1145/2666141.2666142
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Algorithm for Task Scheduling against Side-channel Attacks

Abstract: The problem of ordering task executions has been well studied under power, performance, and thermal constraints. However, it has been pursued less under security concerns. We have observed that different orders of task executions have different side-channel information leakage, thus having different security levels. In this paper, we first model the behavior of the attacker and then propose a secure algorithm for ordering aperiodic tasks that have soft deadlines. Our algorithm can keep a good balance between s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Son et al [41] and Völp et al [70] examined the exploitation of timing channels in real-time scheduling. Bao et al [71] introduce a scheduling algorithm for soft real-time systems (where some tasks can miss deadlines) and provide a trade-off between thermal side-channel information leakage and the number of deadline misses. Their exists other work [56] that studies the robustness of AES secret keys against differential power analysis (DPA) [72] attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Son et al [41] and Völp et al [70] examined the exploitation of timing channels in real-time scheduling. Bao et al [71] introduce a scheduling algorithm for soft real-time systems (where some tasks can miss deadlines) and provide a trade-off between thermal side-channel information leakage and the number of deadline misses. Their exists other work [56] that studies the robustness of AES secret keys against differential power analysis (DPA) [72] attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is imperative for RTESs to protect critical information and against the potential attacks. At present, most researchers focus on designing the security-aware techniques for handling attacks such as SCAs, [1][2][3][4][5] LMFAs, 6 SLCAs and CIAs, 7,8 which are brie°y introduced in Table 2. The details of these attacks and their corresponding solutions are given in the following sections.…”
Section: Speci¯c Attacksmentioning
confidence: 99%
“…Considerable research e®orts have been devoted to the designing of a secure RTES, which can be divided into three categories. The¯rst category to realize a secure system is studying and simulating the common security attacks such as sidechannel attack (SCA), [1][2][3][4][5] level-based multi-fault attacks (LMFAs), 6 system-level cyber attacks (SLCAs), code injection attacks (CIAs), 7,8 etc. The second category to realize a secure system is providing security-guaranteed services such as securityaware model and framework, [9][10][11][12][13] security-driven hardware design, 14,15 encryption algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Thermal profiling can further be used to detect compromised process in embedded systems [58] and design schedulers such that they do not leak information through thermal fingerprints of applications [14].…”
Section: Related Workmentioning
confidence: 99%