Covert timing channels in real-time systems allow adversaries to not only exfiltrate application secrets but also to mount timing inference based attacks. Much effort has been put into improving real-time system predictability with the additional benefit of reducing the former class of confidentiality attacks. However, the more predictable the system behaves, the easier timing inference based attacks become. Time-triggered scheduling is particularly vulnerable to these types of attacks due to offline constructed tables that are scheduled with clock synchronization and OS-timer predictability. In this paper, we obfuscate timetriggered scheduling to complicate timing inference based attacks while maintaining strong protection again...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security p...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
Much effort has been put into improving the predictability of real-time systems, especially in safet...
The high degree of predictability in hard real-time systems makes it possible for adversaries to lau...
Time-triggered real-time systems achieve deterministic behavior using schedules that are constructed...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
In this work, we present a novel approach, called Detector+, to detect, isolate, and prevent timing-...
Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and ...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security p...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
Much effort has been put into improving the predictability of real-time systems, especially in safet...
The high degree of predictability in hard real-time systems makes it possible for adversaries to lau...
Time-triggered real-time systems achieve deterministic behavior using schedules that are constructed...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
In this work, we present a novel approach, called Detector+, to detect, isolate, and prevent timing-...
Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and ...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
We develop a new notion of security against timing attacks where the attacker is able to simultaneou...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security p...
When the running time of a cryptographic algorithm is non-constant, timing measurements can leak inf...