Skip to main navigation Skip to search Skip to main content

A generalized model for preventing information leakage in hard real-time systems

  • Rodolfo Pellizzoni
  • , Neda Paryab
  • , Man Ki Yoon
  • , Stanley Bak
  • , Sibin Mohan
  • , Rakesh B. Bobba

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

44 Scopus citations

Abstract

Traditionally real-time systems and security have been considered as separate domains. Recent attacks on various systems with real-time properties have shown the need for a redesign of such systems to include security as a first class principle. In this paper, we propose a general model for capturing security constraints between tasks in a real-time system. This model is then used in conjunction with real-time scheduling algorithms to prevent the leakage of information via storage channels on implicitly shared resources. We expand upon a mechanism to enforce these constraints viz., cleaning up of shared resource state, and provide schedulability conditions based on fixed priority scheduling with both preemptive and non-preemptive tasks. We perform extensive evaluations, both theoretical and experimental, the latter on a hardware-in-the-loop simulator of an unmanned aerial vehicle (UAV) that executes on a demonstration platform.

Original languageEnglish
Title of host publicationProceedings - 21st IEEE Real Time and Embedded Technology and Applications Symposium, RTAS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages271-282
Number of pages12
ISBN (Electronic)9781479986033
DOIs
StatePublished - May 14 2015
Event21st IEEE Real Time and Embedded Technology and Applications Symposium, RTAS 2015 - Seattle, United States
Duration: Apr 13 2015Apr 16 2015

Publication series

NameProceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS
Volume2015-May

Conference

Conference21st IEEE Real Time and Embedded Technology and Applications Symposium, RTAS 2015
Country/TerritoryUnited States
CitySeattle
Period04/13/1504/16/15

Fingerprint

Dive into the research topics of 'A generalized model for preventing information leakage in hard real-time systems'. Together they form a unique fingerprint.

Cite this