The Community for Technology Leaders
RSS Icon
Subscribe
Philadelphia, PA, USA USA
Apr. 9, 2013 to Apr. 11, 2013
ISBN: 978-1-4799-0186-9
pp: 153-162
Hermann Hartig , Department of Computer Science, Operating Systems Group, Technische Universita¨t Dresden, Germany
ABSTRACT
Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system. However, rather than exacerbating the problem, we found that considering real-time guarantees actually simplifies the security problem of preventing information leakage over shared-resource covert channels. We introduce a transformation for standard real-time resource locking protocols and show that protocols transformed in this way preserve the confidentiality guarantees of the schedulers on which they are based. Through this transformation, we were able to prove that four out of the seven investigated protocols are information-flow secure.
INDEX TERMS
resources, covert channels, information-flow security, real-time systems
CITATION
Hermann Hartig, "On confidentiality-preserving real-time locking protocols", RTAS, 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS), 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS) 2013, pp. 153-162, doi:10.1109/RTAS.2013.6531088
61 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool