This research was funded in whole or in part by the Luxembourg National Research Fund (FNR), grant reference C19/IS/13691843/-ByzRT. For the purpose of open access, and in fulfillment of the obligations arising from the grant agreement, the author has applied a Creative Commons Attribution 4.0 International (CC BY 4.0) license to any Author Accepted Manuscript version arising from this submission.
Many real-time systems nowadays must not only tolerate accidental faults but also targeted attacks. Typically, techniques such as replication and diversification are used to mask the malicious behavior of compromised nodes behind a healthy majority. This work focuses on the replication of event-triggered real-time systems, where prioritized tasks are scheduled non-preemptively on nodes. In such systems, different execution times of replicated jobs on different nodes may lead to their different execution order and different state transitions on nodes. Total order protocols can be used to coordinate nodes to execute jobs in the same order. Previously published total order approaches do not meet all the requirements of real-time systems as a malicious node can inject priority inversion on other nodes in such a way that healthy nodes can no longer guarantee the timely completion of jobs. In this paper, we propose a novel coordination algorithm to detect and tolerate such attacks. In our approach, once jobs are inserted into the ready queues, nodes can proceed with their execution within a bound without further communication until the next release. This bound is updated over time, allowing more jobs from the ready queue to be executed. Upon task release, nodes use reliable communication to share their progress, so they insert the released jobs in the same position in their queues. Nodes evaluate each other’s progress before inserting jobs to verify that scheduling bounds have been respected and to detect any priority inversion injection attacks. We evaluate our approach and show that it can guarantee the schedulability of more task sets than other published total order protocols and exhibit low average response times at reasonable run-time overheads.
FNR13691843 - Byzrt: Intrusion Resilient Real-time Communication And Computation In Autonomous Systems, 2019 (01/09/2020-31/08/2023) - Marcus Völp
Name of the research project :
R-AGR-3904 - C19/IS/13691843/ByzRT - VOLP Marcus
Funders :
FNR - Luxembourg National Research Fund
Funding number :
C19/IS/13691843/-ByzRT
Funding text :
This research was funded in whole or in part by the Luxembourg National Research Fund (FNR), grant reference C19/IS/13691843/-ByzRT. For the purpose of open access, and in fulfillment of the obligations arising from the grant agreement, the author has applied a Creative Commons Attribution 4.0 International (CC BY 4.0) license to any Author Accepted Manuscript version arising from this submission.
Hakan Aydin Abhishek Roy and Dakai Zhu. 2021. Energy-aware primary/backup scheduling of periodic real-time tasks on heterogeneous multicore systems. Sustainable Computing: Informatics and Systems 29 (2021), 100474. https://doi.org/10.1016/j.suscom.2020.100474
Mani Amoozadeh, Arun Raghuramu, Chen-nee Chuah, Dipak Ghosal, H. Michael Zhang, Jeff Rowe, and Karl Levitt. 2015. Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. IEEE Communications Magazine 53, 6 (2015), 126–132. https://doi.org/10.1109/MCOM.2015.7120028
Tom Roeder an Fred B. Schneider. 2010. Proactive Obfuscation. ACM Transactions on Computer Systems (TOCS) 28, 2 (July 2010).
Alaa Askkar. 2011. PA Telecommunications minister: Palestinian Internet Under Hacking Attacks. IMENC avail at. http://www.imemc.org/article/62409.
H. Aydin, R. Melhem, D. Mosse, and P. Mejia-Alvarez. 2001. Dynamic and aggressive scheduling techniques for power-aware real-time systems. In Proceedings 22nd IEEE Real-Time Systems Symposium (RTSS 2001) (Cat. No.01PR1420). 95–105. https://doi.org/10.1109/REAL.2001.990600
Sanjoy Baruah. 2005. The limited-preemption uniprocessor scheduling of sporadic task systems. In 17th Euromicro Conference on Real-Time Systems (ECRTS’05). 137–144. https://doi.org/10.1109/ECRTS.2005.32
Guillem Bernat, Jose Miro-Julia, Julian Proenza, et al. 1997. Fixed Priority Schedulability Analysis of a Distributed Real-Time Fault Tolerant Architecture.. In PDPTA. Citeseer, 479–487.
Marko Bertogna, Giorgio Buttazzo, Mauro Marinoni, Gang Yao, Francesco Esposito, and Marco Caccamo. 2010. Preemption Points Placement for Sporadic Task Sets. In 2010 22nd Euromicro Conference on Real-Time Systems. 251–260. https://doi.org/10.1109/ECRTS.2010.9
N.L. Binkert, L.R. Hsu, A.G. Saidi, R.G. Dreslinski, A.L. Schultz, and S.K. Reinhardt. 2005. Performance analysis of system overheads in TCP/IP workloads. In 14th International Conference on Parallel Architectures and Compilation Techniques (PACT’05). 218–228. https://doi.org/10.1109/PACT.2005.35
Giorgio C. Buttazzo, Marko Bertogna, and Gang Yao. 2013. Limited Preemptive Scheduling for Real-Time Systems. A Survey. IEEE Transactions on Industrial Informatics 9, 1 (2013), 3–15. https://doi.org/10.1109/TII.2012.2188805
Miguel Castro and Barbara Liskov. 2002. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 20, 4 (nov 2002), 398–461. https://doi.org/10.1145/571637.571640
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. 2011. Comprehensive Experimental Analyses of Automotive Attack Surfaces.. In USENIX Security Symposium. San Francisco.
US Federal Energy Regulatory Commission. 2016. Reliability Standards for Physical Security Measures. RD14-6-000.
Miguel Correia, Nuno Ferreira Neves, and Paulo Verissimo. 2013. BFT-TO: Intrusion Tolerance with Less Replicas. Comput. J. 56, 6 (2013), 693–715. https://doi.org/10.1093/comjnl/bxs148
Marco Dürr, Georg Von Der Brüggen, Kuan-Hsun Chen, and Jian-Jia Chen. 2019. End-to-End Timing Analysis of Sporadic Cause-Effect Chains in Distributed Systems. ACM Trans. Embed. Comput. Syst. 18, 5s, Article 58 (oct 2019), 24 pages. https://doi.org/10.1145/3358181
Reinhard Exel, Thomas Bigler, and Thilo Sauter. 2014. Asymmetry Mitigation in IEEE 802.3 Ethernet for High-Accuracy Clock Synchronization. IEEE Transactions on Instrumentation and Measurement 63, 3 (2014), 729–736. https://doi.org/10. 1109/TIM.2013.2280489
Heiko Falk, Sebastian Altmeyer, Peter Hellinckx, Björn Lisper, Wolfgang Puffitsch, Christine Rochange, Martin Schoeberl, Rasmus Bo Sørensen, Peter Wägemann, and Simon Wegener. 2016. TACLeBench: A Benchmark Collection to Support Worst-Case Execution Time Research. In 16th International Workshop on Worst-Case Execution Time Analysis. Toulouse, France. https://doi.org/10.4230/OASIcs.WCET.2016.2
Pietro Fara, Gabriele Serra, Alessandro Biondi, and Ciro Donnarumma. 2021. Scheduling Replica Voting in Fixed-Priority Real-Time Systems. In 33rd Euromicro Conference on Real-Time Systems (ECRTS 2021) (Leibniz International Proceedings in Informatics (LIPIcs), Vol. 196), Björn B. Brandenburg (Ed.). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 13:1–13:21. https://doi.org/10.4230/LIPIcs.ECRTS.2021.13
Nico Feiertag, Kai Richter, Johan Nordlander, and Jan Jonsson. 2009. A compositional framework for end-to-end path delay calculation of automotive systems under different path semantics. In IEEE Real-Time Systems Symposium: 30/11/2009-03/12/2009. IEEE Communications Society.
Joachim Fellmuth, Paula Herber, Tobias Pfeffer, and Sabine Glesner. 2017. Securing Real-Time Cyber-Physical Systems Using WCET-Aware Artificial Diversity. 454–461. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.88
Laurent George, Nicolas Rivierre, and Marco Spuri. 1996. Preemptive and Non-Preemptive Real-Time UniProcessor Scheduling. Research Report RR-2966. INRIA. https://hal.inria.fr/inria-00073732 Projet REFLECS.
David Griffin, Iain Bate, and Robert I. Davis. 2020. Generating Utilization Vectors for the Systematic Evaluation of Schedulability Tests. In 2020 IEEE Real-Time Systems Symposium (RTSS). 76–88. https://doi.org/10.1109/RTSS49844.2020.00018
Arpan Gujarati, Sergey Bozhko, and Björn B. Brandenburg. 2020. Real-Time Replica Consistency over Ethernet with Reliability Bounds. In 2020 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). 376–389. https://doi.org/10.1109/RTAS48715.2020.00012
Mario Günzel, Harun Teper, Kuan-Hsun Chen, Georg von der Brüggen, and Jian-Jia Chen. 2023. On the Equivalence of Maximum Reaction Time and Maximum Data Age for Cause-Effect Chains. In 35th Euromicro Conference on Real-Time Systems (ECRTS 2023) (Leibniz International Proceedings in Informatics (LIPIcs), Vol. 262), Alessandro V. Papadopoulos (Ed.). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 10:1–10:22. https://doi.org/10.4230/LIPIcs.ECRTS.2023.10
Zhishan Guo, Sudharsan Vaidhun, Abdullah Al Arafat, Nan Guan, and Kecheng Yang. 2023. Stealing Static Slack Via WCRT and Sporadic P-Servers in Deadline-Driven Scheduling. In 2023 IEEE Real-Time Systems Symposium (RTSS). 40–52. https://doi.org/10.1109/RTSS59052.2023.00014
Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, and Rakesh B. Bobba. 2018. A design-space exploration for allocating security tasks in multicore real-time systems. In 2018 Design, Automation Test in Europe Conference Exhibition (DATE). 225–230. https://doi.org/10.23919/DATE.2018.8342007
K. Jeffay, D.F. Stanat, and C.U. Martel. 1991. On non-preemptive scheduling of period and sporadic tasks. In [1991] Proceedings Twelfth Real-Time Systems Symposium. 129–139. https://doi.org/10.1109/REAL.1991.160366
Uğur Keskin, Reinder J. Bril, and Johan J. Lukkien. 2010. Exact response-time analysis for fixed-priority preemption-threshold scheduling. In 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation. 1–4. https://doi.org/10.1109/ETFA.2010.5640984
J. Kim, G. Park, H. Shim, and Y. Eun. 2016. Zero-stealthy attack for sampled data control systems: The case of faster actuation than sensing. In IEEE Conference on Decision and Control (CDC). 5956––5961.
K.H. Kim, Jing Qian, Zhen Zhang, Qian Zhou, Kyung-Deok Moon, Jun-Hee Park, Kwang-Roh Park, and Doo-Hyun Kim. 2010. A Scheme for Reliable Real-Time Messaging with Bounded Delays. In 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing. 18–27. https://doi.org/10.1109/ISORC.2010.45
Leonie Köhler, Phil Hertha, Matthias Beckert, Alex Bendrick, and Rolf Ernst. 2023. Robust Cause-Effect Chains with Bounded Execution Time and System-Level Logical Execution Time. ACM Trans. Embed. Comput. Syst. 22, 3, Article 50 (apr 2023), 28 pages. https://doi.org/10.1145/3573388
H. Kopetz and G. Bauer. 2003. The time-triggered architecture. Proc. IEEE 91, 1 (2003), 112–126. https://doi.org/10.1109/JPROC.2002.805821
H. Kopetz and G. Grunsteidl. 1993. TTP - A time-triggered protocol for fault-tolerant real-time systems. In FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing. 524–533. https://doi.org/10.1109/FTCS.1993.627355
D. Kozhaya, J. Decouchant, and P. Esteves-Verissimo. 2019. RT-ByzCast: Byzantine-Resilient Real-Time Reliable Broadcast. IEEE Trans. Comput. 68, 03 (mar 2019), 440–454. https://doi.org/10.1109/TC.2018.2871443
David Kozhaya, Jérémie Decouchant, Vincent Rahli, and Paulo Esteves-Verissimo. 2021. PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite. IEEE Transactions on Parallel and Distributed Systems 32, 9 (2021), 2277–2290. https://doi.org/10.1109/TPDS.2021.3056718
Kristin Krüger, Nils Vreman, Richard Pates, Martina Maggio, Marcus Völp, and Gerhard Fohler. 2021. Randomization as Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Real-Time Systems with Task Replication. 7 (Aug. 2021), 01:1–01:29. https://doi.org/10.4230/LITES.7.1.1
Robert M. Lee, Michael J. Assante, and Tim Conway. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. E-ISAC avail at. https://ics.sans.org/media/EISAC_SANS_Ukraine_DUC_5.pdf.
Haoran Li, Chenyang Lu, and Christopher D. Gill. 2021. RT-ZooKeeper: Taming the Recovery Latency of a Coordination Service. ACM Trans. Embed. Comput. Syst. 20, 5s, Article 103 (Sept. 2021), 22 pages. https://doi.org/10.1145/3477034
C. L. Liu and James W. Layland. 1973. Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment. J. ACM 20, 1 (jan 1973), 46–61. https://doi.org/10.1145/321738.321743
Filip Marković, Jan Carlson, Sebastian Altmeyer, and Radu Dobrin. 2020. Improving the Accuracy of Cache-Aware Response Time Analysis Using Preemption Partitioning. In 32nd Euromicro Conference on Real-Time Systems (ECRTS 2020) (Leibniz International Proceedings in Informatics (LIPIcs), Vol. 165). Schloss Dagstuhl–Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 5:1–5:23. https://doi.org/10.4230/LIPIcs.ECRTS.2020.5
Odorico Machado Mendizabal, Fernando Luís Dotti, and Fernando Pedone. 2017. High Performance Recovery for Parallel State Machine Replication. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 34–44. https://doi.org/10.1109/ICDCS.2017.193
Jeanne Meserve. 2007. Mouse click could plunge city into darkness, experts say. http://edition.cnn.com/2007/US/09/27/power.at.risk/index.html. Accessed: 2017-03-12.
Amin Naghavi, Sepideh Safari, and Shaahin Hessabi. 2021. Tolerating Permanent Faults with Low-Energy Overhead in Multicore Mixed-Criticality Systems. IEEE Transactions on Emerging Topics in Computing (2021), 1–1. https://doi.org/10.1109/TETC.2021.3059724
Mitra Nasri, Thidapat Chantem, Gedare Bloom, and Ryan M. Gerdes. 2019. On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks. In 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). 103–116. https://doi.org/10.1109/RTAS.2019.00017
Risat Mahmud Pathan. 2014. Fault-tolerant and real-time scheduling for mixed-criticality systems. Real-Time Syst. 50 (2014), 509–547. https://doi.org/10.1016/j.suscom.2020.100474
Veríssimo P.E., Neves N.F., and Correia M.P. 2003. Intrusion-Tolerant Architectures: Concepts and Design. Architecting Dependable Systems. Lecture Notes in Computer Science 2677 (2003). https://doi.org/10.1007/3-540-45177-3_1
M. Pease, R. Shostak, and L. Lamport. 1980. Reaching Agreement in the Presence of Faults. J. ACM 27, 2 (April 1980), 228–234. https://doi.org/10.1145/322186. 322188
Linh T. X. Phan, Meng Xu, Jaewoo Lee, Insup Lee, and Oleg Sokolsky. 2013. Overhead-aware compositional analysis of real-time systems. In 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS). 237–246. https://doi.org/10.1109/RTAS.2013.6531096
S. Poledna, A. Burns, A. Wellings, and P. Barrett. 2000. Replica determinism and flexible scheduling in hard real-time dependable systems. IEEE Trans. Comput. 49, 2 (2000), 100–111. https://doi.org/10.1109/12.833107
R. Pucella and F. B. Schneider. 2006. Independence from obfuscation: A semantic framework for diversity.. In 19th IEEE Work. on Computer Security Foundations. 230–241.
Luís Rodrigues, Paulo Veríssimo, and Antonio Casimiro. 1995. Priority-Based Totally Ordered Multicast. In 3rd IFIP/IFAC workshop on Algorithms and Architectures for Real-Time Control (AARTC).
Edo Roth and Andreas Haeberlen. 2021. Do Not Overpay for Fault Tolerance!. In 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS’21). https://doi.org/10.1109/RTAS52030.2021.00037
F Schneider. 2005. Replication management using the statemachine approach. Mullender [7] (2005).
Brad Spengler. 2003. PaX: The Guaranteed End of Arbitrary Code Execution. grsecurity.net avail at. https://grsecurity.net/PaX-presentation.pdf.
Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, and Paulo Verissimo. 2013. Efficient Byzantine Fault-Tolerance. IEEE Trans. Comput. 62, 1 (2013), 16–30. https://doi.org/10.1109/TC.2011.221
Yun Wang, E. Anceaume, F. Brasileiro, F. Greve, and M. Hurfin. 2002. Solving the group priority inversion problem in a timed asynchronous system. IEEE Trans. Comput. 51, 8 (2002), 900–915. https://doi.org/10.1109/TC.2002.1024738
Yi wen Zhang and Rui feng Guo. 2013. Power-aware scheduling algorithms for sporadic tasks in real-time systems. Journal of Systems and Software 86, 10 (2013), 2611–2619. https://doi.org/10.1016/j.jss.2013.04.075
Beyazit Yalcinkaya, Mitra Nasri, and Björn B. Brandenburg. 2019. An Exact Schedulability Test for Non-Preemptive Self-Suspending Real-Time Tasks. In Design, Automation & Test in Europe Conference & Exhibition, DATE 2019, Florence, Italy, March 25-29, 2019, Jürgen Teich and Franco Fummi (Eds.). IEEE, 1228–1233. https://doi.org/10.23919/DATE.2019.8715111
Gang Yao, Giorgio Buttazzo, and Marko Bertogna. 2009. Bounding the maximum length of non-preemptive regions under fixed priority scheduling. In 2009 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 351–360.
Man-Ki Yoon, Sibin Mohan, Chien-Ying Chen, and Lui Sha. 2016. TaskShuffler: A Schedule Randomization Protocol for Obfuscation against Timing Inference Attacks in Real-Time Systems. In 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). 1–12. https://doi.org/10.1109/RTAS.2016. 7461362
Lin Zhang, Kaustubh Sridhar, Mengyu Liu, Pengyuan Lu, Xin Chen, Fanxin Kong, Oleg Sokolsky, and Insup Lee. 2023. Real-Time Data-Predictive Attack-Recovery for Complex Cyber-Physical Systems. In 2023 IEEE 29th Real-Time and Embedded Technology and Applications Symposium (RTAS). 209–222. https://doi.org/10.1109/RTAS58335.2023.00024
Yunhao Zhang, Srinath Setty, Qi Chen, Lidong Zhou, and Lorenzo Alvisi. 2020. Byzantine Ordered Consensus without Byzantine Oligarchy. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). USENIX Association, 633–649. https://www.usenix.org/conference/osdi20/presentation/zhang-yunhao
H. Zou and F. Jahanian. 1998. Real-time primary-backup (RTPB) replication with temporal consistency guarantees. In Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183). 48–56. https://doi.org/10.1109/ICDCS.1998.679486