2020
DOI: 10.1109/access.2020.3019323
|View full text |Cite
|
Sign up to set email alerts
|

Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack

Abstract: Recent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks. An important assumption in this type of attacks is the prior knowledge of attackers about the task parameter information, including the number of tasks in the system and the period and execution time of each task. The attackers can use such information, together with the execution sequence of the task system, to reconstruct the exact sche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…The devised methods to directly infer the number of tasks, as well as the period and execution time of each task from the execution sequence. This eliminates the need for attackers to possess task parameter information beforehand, thereby intensifying the threat posed by schedule-based timing side-channel attacks [222].…”
Section: Side Channel Protection Countermeasuresmentioning
confidence: 99%
“…The devised methods to directly infer the number of tasks, as well as the period and execution time of each task from the execution sequence. This eliminates the need for attackers to possess task parameter information beforehand, thereby intensifying the threat posed by schedule-based timing side-channel attacks [222].…”
Section: Side Channel Protection Countermeasuresmentioning
confidence: 99%
“…[4]. Liu et al (2020) explain that these scheduling and timing side-channel attacks can be done even without knowing the existing task parameter information. However, an attacker can use this information and, at the same time, the order of execution process in the task system, even when it is possible to reconstruct the speci c schedule of the mission, to make a variety of subsequent attacks [5].…”
Section: Literature Surveymentioning
confidence: 99%
“…In [4], an automation process for data deduplication is presented towards increase of con dentiality. The system uses user end encryption and data comparison is performed with hash value of different les helps in faster and secure comparison.…”
Section: Related Workmentioning
confidence: 99%