SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors

被引:4
作者
Chen, Jiyang [1 ]
Kloda, Tomasz [2 ]
Tabish, Rohan [3 ]
Bansal, Ayoosh [3 ]
Chen, Chien-Ying [3 ]
Liu, Bo [3 ]
Mohan, Sibin [3 ,4 ]
Caccamo, Marco [1 ]
Sha, Lui [3 ]
机构
[1] Tech Univ Munich, Munich, Germany
[2] Univ Toulouse, INSA, LAAS CNRS, Toulouse, France
[3] Univ Illinois, Urbana, IL USA
[4] George Washington Univ, Washington, DC 20052 USA
基金
美国国家科学基金会;
关键词
Response time analysis; Linux containers; Logical Execution Time; security; ARCHITECTURE; SECURITY;
D O I
10.1145/3565974
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Timing correctness is crucial in a multi-criticality real-time system, such as an autonomous driving system. It has been recently shown that these systems can be vulnerable to timing inference attacks, mainly due to their predictable behavioral patterns. Existing solutions like schedule randomization cannot protect against such attacks, often limited by the system's real-time nature. This article presents "SchedGuard++": a temporal protection framework for Linux-based real-time systems that protects against posterior schedule-based attacks by preventing untrusted tasks from executing during specific time intervals. SchedGuard++ supports multi-core platforms and is implemented using Linux containers and a customized Linux kernel real-time scheduler. We provide schedulability analysis assuming the Logical Execution Time (LET) paradigm, which enforces I/O predictability. The proposed response time analysis takes into account the interference from trusted and untrusted tasks and the impact of the protection mechanism. We demonstrate the effectiveness of our system using a realistic radio-controlled rover platform. Not only is "SchedGuard++" able to protect against the posterior schedule-based attacks, but it also ensures that the real-time tasks/containers meet their temporal requirements.
引用
收藏
页数:25
相关论文
共 63 条
[31]   Security-Aware Obfuscated Priority Assignment for Automotive CAN Platforms [J].
Lukasiewycz, Martin ;
Mundhenk, Philipp ;
Steinhorst, Sebastian .
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2016, 21 (02)
[32]  
Miller C., 2014, Black Hat USA, V2014, P94
[33]  
Miller C., 2015, Black Hat USA
[34]   Secure Control Against Replay Attacks [J].
Mo, Yilin ;
Sinopoli, Bruno .
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, :911-918
[35]  
Mohan S., 2013, P 2 ACM INT C HIGH C, P65
[36]   Real-Time Systems Security Through Scheduler Constraints [J].
Mohan, Sibin ;
Yoon, Man-Ki ;
Pellizzoni, Rodolfo ;
Bobba, Rakesh .
2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), 2014, :129-+
[37]   On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks [J].
Nasri, Mitra ;
Chantem, Thidapat ;
Bloom, Gedare ;
Gerdes, Ryan M. .
25TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2019), 2019, :103-116
[38]  
Park G, 2016, IEEE DECIS CONTR P, P5085, DOI 10.1109/CDC.2016.7799047
[39]  
Pellizzoni R, 2015, 21ST IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2015), P271, DOI 10.1109/RTAS.2015.7108450
[40]  
Petit J., 2015, BLACK HAT EUR, VVol. 11, P995