{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T13:48:42Z","timestamp":1694353722397},"reference-count":15,"publisher":"Association for Computing Machinery (ACM)","issue":"5s","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072067, 62172069, 51978120, U1808206, 61602080, 61872052, 61906032, 61761136019, 61601080, 61602084 and 61772112"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Dalian Young Star of Science and Technology Project","award":["2021RQ055 and 2018RQ45"]},{"DOI":"10.13039\/501100010245","name":"Social Science Foundation of Liaoning Province","doi-asserted-by":"crossref","award":["L17CTQ002"],"id":[{"id":"10.13039\/501100010245","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["DUT21JC27 and DUT22LAB110"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2023,10,31]]},"abstract":"With widespread use of common-off-the-shelf components and the drive towards connection with external environments, the real-time systems are facing more and more security problems. In particular, the real-time systems are vulnerable to the schedule-based attacks because of their predictable and deterministic nature in operation. In this paper, we present a security-aware real-time scheduling scheme to counteract the schedule-based attacks by preventing the untrusted tasks from executing during the attack effective window (AEW). In order to minimize the AEW untrusted coverage ratio for the system with uncertain AEW size, we introduce the protection window to characterize the system protection capability limit due to the system schedulability constraint. To increase the opportunity of the priority inversion for the security-aware scheduling, we design an online feasibility test method based on the busy interval analysis. In addition, to reduce the run-time overhead of the online feasibility test, we also propose an efficient online feasibility test method based on the priority inversion budget analysis to avoid online iterative calculation through the offline maximum slack analysis. Owing to the protection window and the online feasibility test, our proposed approach can efficiently provide best-effort protection to mitigate the schedule-based attack vulnerability while ensuring system schedulability. Experiments show the significant security capability improvement of our proposed approach over the state-of-the-art coverage oriented scheduling algorithm.<\/jats:p>","DOI":"10.1145\/3609098","type":"journal-article","created":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T13:33:18Z","timestamp":1694266398000},"page":"1-22","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6289-1513","authenticated-orcid":false,"given":"Jiankang","family":"Ren","sequence":"first","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0000-3052-3679","authenticated-orcid":false,"given":"Chunxiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0302-5102","authenticated-orcid":false,"given":"Chi","family":"Lin","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2750-691X","authenticated-orcid":false,"given":"Ran","family":"Bi","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0007-8700-3827","authenticated-orcid":false,"given":"Simeng","family":"Li","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-8255-5375","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0002-2641-5303","authenticated-orcid":false,"given":"Yicheng","family":"Qian","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0008-7274-3192","authenticated-orcid":false,"given":"Zhichao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7224-5694","authenticated-orcid":false,"given":"Guozhen","family":"Tan","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,9,9]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831166"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-005-0507-9"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18124356"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00016"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484769"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00010"},{"key":"e_1_3_1_8_2","first-page":"1","volume-title":"6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS\u201915)","author":"Kramer Simon","year":"2015","unstructured":"Simon Kramer, Dirk Ziegenbein, and Arne Hamann. 2015. Real world automotive benchmarks for free. In 6th International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS\u201915). 1\u20136."},{"key":"e_1_3_1_9_2","first-page":"859","volume-title":"29th USENIX Security Symposium (USENIX Security\u201920)","author":"Luo Mulong","year":"2020","unstructured":"Mulong Luo, Andrew C. Myers, and G. Edward Suh. 2020. Stealthy tracking of autonomous vehicles with cache side channels. In 29th USENIX Security Symposium (USENIX Security\u201920). USENIX Association, 859\u2013876. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/luo"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00017"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2015.7108450"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652117"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465919"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00052"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"e_1_3_1_16_2","unstructured":"Man-Ki Yoon Jung-Eun Kim Richard Bradford and Zhong Shao. 2019. TaskShuffler++: Real-Time Schedule Randomization for Reducing Worst-Case Vulnerability to Timing Inference Attacks. (2019). arxiv:cs.CR\/1911.07726"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T13:37:05Z","timestamp":1694266625000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,9]]},"references-count":15,"journal-issue":{"issue":"5s","published-print":{"date-parts":[[2023,10,31]]}},"alternative-id":["10.1145\/3609098"],"URL":"https:\/\/doi.org\/10.1145\/3609098","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,9]]},"assertion":[{"value":"2023-03-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}