2016
DOI: 10.1007/s11241-016-9252-5
|View full text |Cite
|
Sign up to set email alerts
|

Integrating security constraints into fixed priority real-time schedulers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 23 publications
0
19
0
Order By: Relevance
“…As we follow the common assumptions of the existing studies for real-time systems that consider the timing-inference attacks to induce information leakage on shared resources [4], [27], [30], [32], we also assume that an adversary knows the task parameters of a target task (called victim task) for his security attack and aims at gleaning the sensitive data on the resources shared by different tasks. This assumption is based on the fact that many critical functions of a real-time the summation of all resource usage time for λx by any single job Ji of τi.…”
Section: A Adversary Modelmentioning
confidence: 99%
“…As we follow the common assumptions of the existing studies for real-time systems that consider the timing-inference attacks to induce information leakage on shared resources [4], [27], [30], [32], we also assume that an adversary knows the task parameters of a target task (called victim task) for his security attack and aims at gleaning the sensitive data on the resources shared by different tasks. This assumption is based on the fact that many critical functions of a real-time the summation of all resource usage time for λx by any single job Ji of τi.…”
Section: A Adversary Modelmentioning
confidence: 99%
“…Note that the addition of any security mechanisms (such as IDS, encryption/authentication, behavior-based monitoring, etc.) may require modification of the system or the RT task parameters as was the case in prior work [7][8][9][10][11][12][13][14][15].…”
Section: Application Specific Checkingmentioning
confidence: 99%
“…References Approaches Security-aware model and framework Pellizzoni et al 9 Generalized model Abdi et al 10 Restart-based framework Hasan et al 11 Contego Ma et al 12 Control and security management Paryab 13 Integrating security mechanisms Security-driven hardware design Tan et al 14 System-level method in MPSoC Saadatmand 15 Method using CBD and MDD Encryption algorithm Zhang et al 16 MTVOM Jiang et al 17 Hardware/software technology Jiang et al 18 FVUC Mohan et al 19 SCRTS analytical framework for system designers to determine the best trade-o®s between the control system performance and the security customizing parameters of the systems while ensuring the security of the physical system. Simulation results showed that ReSecure can guarantee a secure system under the unavailability of complex units.…”
Section: Servicesmentioning
confidence: 99%
“…Each time a hand-o® occurs between tasks that belong to di®erent levels of security, the information may leak through shared resources. To deal with the information leakage problem, Mohan et al 19 proposed a method named SCRTS to integrate security constraints into real-time scheduling algorithms. The main idea of the method is to amend the real-time scheduling method and use shared resources to alleviate the information leakage problem among tasks of di®erent security levels.…”
Section: Encryption Algorithmmentioning
confidence: 99%
See 1 more Smart Citation