Reference : Vulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on T...
Scientific journals : Article
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/37810
Vulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems
English
Krüger, Kristin [Technische Universität Kaiserslautern]
Volp, Marcus mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Fohler, Gerhard [Technische Universität Kaiserslautern]
Jun-2018
LIPIcs-Leibniz International Proceedings in Informatics
Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik
106
22:1--22:17
Yes
International
1868-8969
Dagstuhl
Germany
[en] Much effort has been put into improving the predictability of real-time systems, especially in safety-critical environments, which provides designers with a rich set of methods and tools to attest safety in situations with no or a limited number of accidental faults. However, with increasing connectivity of real-time systems and a wide availability of increasingly sophisticated exploits, security and, in particular, the consequences of predictability on security become concerns of equal importance. Time-triggered scheduling with offline constructed tables provides determinism and simplifies timing inference, however, at the same time, time-triggered scheduling creates vulnerabilities by allowing attackers to target their attacks to specific, deterministically scheduled and possibly safety-critical tasks. In this paper, we analyze the severity of these vulnerabilities by assuming successful compromise of a subset of the tasks running in a real-time system and by investigating the attack potential that attackers gain from them. Moreover, we discuss two ways to mitigate direct attacks: slot-level online randomization of schedules, and offline schedule-diversification. We evaluate these mitigation strategies with a real-world case study to show their practicability for mitigating not only accidentally malicious behavior, but also malicious behavior triggered by attackers on purpose.
http://hdl.handle.net/10993/37810
10.4230/LIPIcs.ECRTS.2018.22

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
LIPIcs-ECRTS-2018-22.pdfPublisher postprint430.13 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.