Multimode Security-Aware Real-Time Scheduling on Multiprocessors

被引:0
作者
Ren, Jiankang [1 ]
Liu, Chunxiao [1 ]
Lin, Chi [2 ]
Jiang, Wei [3 ]
Wang, Pengfei [1 ]
Qi, Xiangwei [4 ]
Li, Simeng [1 ]
Li, Shengyu [1 ]
机构
[1] Dalian Univ Technol, Key Lab Social Comp & Cognit Intelligence, Minist Educ, Dalian 116024, Peoples R China
[2] Dalian Univ Technol, Sch Software Technol, Dalian 116024, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[4] Xinjiang Normal Univ, Sch Comp Sci & Technol, Urumqi 830054, Xinjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Multimode scheduling; multiprocessor; real-time systems; schedule-based attacks; security-aware scheduling;
D O I
10.1109/TCAD.2024.3445260
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Embedded real-time systems generally execute in a predictable and deterministic manner to deliver critical functionality within stringent timing constraints. However, the predictable execution behavior leaves the system vulnerable to schedule-based attacks. In this article, we present a multimode security-aware real-time scheduling scheme to counteract schedule-based attacks on multiprocessor real-time systems. To mitigate the vulnerability to the schedule-based attack, we propose a multimode scheduling method to reduce the accumulative attack effective window (AEW) of multiple victim tasks and prevent the untrusted tasks from executing during the AEW by distinctively scheduling mixed-trust tasks according to the system mode. To avoid the protection degradation due to the excessive blocking of untrusted tasks, we introduce a protection window for multiple victims on multiprocessors by analyzing the system protection capability limit under the system schedulability constraint. Furthermore, to maximize the protection capability of the multimode security-aware scheduling strategy on a multiprocessor platform, we also propose a security-aware packing algorithm to balance the workloads of mixed-trust tasks on different processors using a mixed-trust worst-fit decreasing heuristic strategy. The experimental results demonstrate that our proposed approach significantly outperforms the state-of-the-art method. Specifically, the AEW ratio and the AEW untrusted execution time ratio are reduced by 18.8% and 62.8%, respectively, while the defense success rate against ScheduLeak attack is improved by 16.3%.
引用
收藏
页码:3407 / 3418
页数:12
相关论文
共 25 条
[1]  
[Anonymous], 2022, Rep. CP R22-11
[2]  
[Anonymous], 2008, P 2008 ACM S INFORM
[3]  
[Anonymous], 2005, ISO Standard 17356-3
[4]  
Bi SZ, 2013, IEEE GLOB COMM CONF, P772, DOI 10.1109/GLOCOM.2013.6831166
[5]   Measuring the performance of schedulability tests [J].
Bini, E ;
Buttazzo, GC .
REAL-TIME SYSTEMS, 2005, 30 (1-2) :129-153
[6]  
Chen CY, 2019, Arxiv, DOI arXiv:1806.01393
[7]  
Chen CY, 2019, IEEE REAL TIME, P90, DOI [10.1109/HPCC/SmartCity/DSS.2019.00028, 10.1109/RTAS.2019.00016]
[8]   SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors [J].
Chen, Jiyang ;
Kloda, Tomasz ;
Tabish, Rohan ;
Bansal, Ayoosh ;
Chen, Chien-Ying ;
Liu, Bo ;
Mohan, Sibin ;
Caccamo, Marco ;
Sha, Lui .
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2023, 7 (01)
[9]   SchedGuard: Protecting against Schedule Leaks Using Linux Containers [J].
Chen, Jiyang ;
Kloda, Tomasz ;
Bansal, Ayoosh ;
Tabish, Rohan ;
Chen, Chien-Ying ;
Liu, Bo ;
Mohan, Sibin ;
Caccamo, Marco ;
Sha, Lui .
2021 IEEE 27TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2021), 2021, :14-26
[10]  
Hasan M, 2020, DES AUT TEST EUROPE, P430, DOI 10.23919/DATE48585.2020.9116364