Integrating security constraints into fixed priority real-time schedulers

被引:0
作者
Sibin Mohan
Man-Ki Yoon
Rodolfo Pellizzoni
Rakesh B. Bobba
机构
[1] University of Illinois at Urbana-Champaign,Information Trust Institute
[2] University of Illinois at Urbana-Champaign,Department of Computer Science
[3] University of Waterloo,Department of Electrical and Computer Engineering
[4] Oregon State University,School of Electrical Engineering and Computer Science
来源
Real-Time Systems | 2016年 / 52卷
关键词
Security; Real-time systems; Scheduling; Fixed priority schedulers; Information leakage; Security for real-time systems;
D O I
暂无
中图分类号
学科分类号
摘要
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security breaches and external attacks. This was mainly due to the use of proprietary hardware and protocols in such systems along with physical isolation. Hence, security and RTS were considered to be separate domains. This assumption is being challenged by recent events that highlight the vulnerabilities in such systems. In this paper, we focus on how to integrate security as a first-class principle in the design of RTS. We demonstrate how certain security requirements can be cast as real-time scheduling constraints. We use information leakage as a motivating problem to illustrate our techniques and focus on the class of fixed-priority real-time schedulers. We evaluate our approach both analytically as well as using simulations and discuss the tradeoffs in using such an approach. Our work shows that many real-time task sets can be scheduled using our methods without significant performance impact.
引用
收藏
页码:644 / 674
页数:30
相关论文
共 22 条
  • [1] Audsley AN(1993)Applying new scheduling theory to static priority pre-emptive scheduling Softw Eng J 8 284-292
  • [2] Burns A(1976)A lattice model of secure information flow Commun ACM 19 236-243
  • [3] Richardson M(2009)Static security optimization for real-time systems IEEE Trans Ind Inform 5 22-37
  • [4] Tindell K(1973)Scheduling algorithms for multiprogramming in a hard-real-time environment J. ACM 20 46-61
  • [5] Denning DE(2008)Secure operation, control, and maintenance of future E-enabled airplanes IEEE Proc 96 1992-2007
  • [6] Lin M(2000)Integrating security and real-time requirements using covert channel capacity IEEE Trans Knowl Data Eng 12 865-879
  • [7] Xu L(2007)Improving security for periodic tasks in embedded systems through scheduling ACM Trans Embed Comput Syst 6 20-undefined
  • [8] Yang L(undefined)undefined undefined undefined undefined-undefined
  • [9] Qin X(undefined)undefined undefined undefined undefined-undefined
  • [10] Zheng N(undefined)undefined undefined undefined undefined-undefined