Incorporating Security Constraints into Mixed-Criticality Real-Time Scheduling

被引:8
作者
Baek, Hyeongboo [1 ]
Lee, Jinkyu [1 ]
机构
[1] Sungkyunkwan Univ SKKU, Dept Comp Sci & Engn, Seoul, South Korea
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2017年 / E100D卷 / 09期
基金
新加坡国家研究基金会;
关键词
mixed-criticality system; security; real-time scheduling; schedulability analysis;
D O I
10.1587/transinf.2016EDP7447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While conventional studies on real-time systems have mostly considered the real-time constraint of real-time systems only, recent research initiatives are trying to incorporate a security constraint into real-time scheduling due to the recognition that the violation of either of two constrains can cause catastrophic losses for humans, the system, and even environment. The focus of most studies, however, is the single-criticality systems, while the security of mixed-criticality systems has received scant attention, even though security is also a critical issue for the design of mixed-criticality systems. In this paper, we address the problem of the information leakage that arises from the shared resources that are used by tasks with different security-levels of mixed-criticality systems. We define a new concept of the security constraint employing a pre-flushing mechanism to cleanse the state of shared resources whenever there is a possibility of the information leakage regarding it. Then, we propose a new non-preemptive real-time scheduling algorithm and a schedulability analysis, which incorporate the security constraint for mixed-criticality systems. Our evaluation demonstrated that a large number of real-time tasks can be scheduled without a significant performance loss under a new security constraint.
引用
收藏
页码:2068 / 2080
页数:13
相关论文
共 27 条
  • [11] Fine-tuning MAC-level protocols for optimized real-time QoS
    Grenier, Mathieu
    Navet, Nicolas
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2008, 4 (01) : 6 - 15
  • [12] FINDING RESPONSE-TIMES IN A REAL-TIME SYSTEM
    JOSEPH, M
    PANDYA, P
    [J]. COMPUTER JOURNAL, 1986, 29 (05) : 390 - 395
  • [13] Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
  • [14] Experimental Security Analysis of a Modern Automobile
    Koscher, Karl
    Czeskis, Alexei
    Roesner, Franziska
    Patel, Shwetak
    Kohno, Tadayoshi
    Checkoway, Stephen
    Mccoy, Damon
    Kantor, Brian
    Anderson, Danny
    Shacham, Hovav
    Savage, Stefan
    [J]. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 447 - 462
  • [15] Static Security Optimization for Real-Time Systems
    Lin, Man
    Xu, Li
    Yang, Laurence T.
    Qin, Xiao
    Zheng, Nenggan
    Wu, Zhaohui
    Qiu, Meikang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (01) : 22 - 37
  • [16] SCHEDULING ALGORITHMS FOR MULTIPROGRAMMING IN A HARD-REAL-TIME ENVIRONMENT
    LIU, CL
    LAYLAND, JW
    [J]. JOURNAL OF THE ACM, 1973, 20 (01) : 46 - 61
  • [17] Mancuso R, 2013, IEEE REAL TIME, P45, DOI 10.1109/RTAS.2013.6531078
  • [18] Real-Time Systems Security Through Scheduler Constraints
    Mohan, Sibin
    Yoon, Man-Ki
    Pellizzoni, Rodolfo
    Bobba, Rakesh
    [J]. 2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), 2014, : 129 - +
  • [19] Pellizzoni R, 2015, 21ST IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2015), P271, DOI 10.1109/RTAS.2015.7108450
  • [20] Tightening the bounds on feasible preemption points
    Ramaprasad, Harini
    Mueller, Frank
    [J]. 27TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, 2006, : 212 - +