SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors

被引:4
作者
Chen, Jiyang [1 ]
Kloda, Tomasz [2 ]
Tabish, Rohan [3 ]
Bansal, Ayoosh [3 ]
Chen, Chien-Ying [3 ]
Liu, Bo [3 ]
Mohan, Sibin [3 ,4 ]
Caccamo, Marco [1 ]
Sha, Lui [3 ]
机构
[1] Tech Univ Munich, Munich, Germany
[2] Univ Toulouse, INSA, LAAS CNRS, Toulouse, France
[3] Univ Illinois, Urbana, IL USA
[4] George Washington Univ, Washington, DC 20052 USA
基金
美国国家科学基金会;
关键词
Response time analysis; Linux containers; Logical Execution Time; security; ARCHITECTURE; SECURITY;
D O I
10.1145/3565974
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous driving system. It has been recently shown that these systems can be vulnerable to timing inference attacks, mainly due to their predictable behavioral patterns. Existing solutions like schedule randomization cannot protect against such attacks, often limited by the system's real-time nature. This article presents "SchedGuard++": a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks by preventing untrusted tasks from executing during specific time intervals. SchedGuard++ supports multi-core platforms and is implemented using Linux containers and a customized Linux kernel real-time scheduler. We provide schedulability analysis assuming the Logical Execution Time (LET) paradigm, which enforces I/O predictability. The proposed response time analysis takes into account the interference from trusted and untrusted tasks and the impact of the protection mechanism. We demonstrate the effectiveness of our system using a realistic radio-controlled rover platform. Not only is "SchedGuard++" able to protect against the posterior schedule-based attacks, but it also ensures that the real-time tasks/containers meet their temporal requirements.
引用
收藏
页数:25
相关论文
共 63 条
[1]  
[Anonymous], HACKERS REMOTELY KIL
[2]  
[Anonymous], 2018, Dagstuhl Reports
[3]  
[Anonymous], 2017, Briefing, Black Hat USA
[4]  
[Anonymous], 1992, Journal of Computer Security
[5]  
[Anonymous], 2005, OSEK VDX OPERATING S
[6]   Feasibility analysis of recurring branching tasks [J].
Baruah, SK .
10TH EUROMICRO WORKSHOP ON REAL-TIME SYSTEMS, PROCEEDINGS, 1998, :138-145
[7]  
Bletsas Konstantinos, 2018, LEIBNIZ T EMBEDDED S, V5, DOI [10.4230/LITESv005-i001-a002, DOI 10.4230/LITESV005-I001-A002]
[8]   Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving [J].
Cao, Yulong ;
Xiao, Chaowei ;
Cyr, Benjamin ;
Zhou, Yimeng ;
Park, Won ;
Rampazzi, Sara ;
Chen, Qi Alfred ;
Fu, Kevin ;
Mao, Z. Morley .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :2267-2281
[9]  
Checkoway S., 2011, P 20 USENIX SEC S AU, P6
[10]  
Chen CY, 2019, Arxiv, DOI arXiv:1806.01393