The Community for Technology Leaders
2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS) (2013)
Philadelphia, PA, USA USA
Apr. 9, 2013 to Apr. 11, 2013
ISSN: 1080-1812
ISBN: 978-1-4799-0186-9
pp: 153-162
M. Volp , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
B. Engel , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
C. Hamann , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
H. Hartig , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
ABSTRACT
Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system. However, rather than exacerbating the problem, we found that considering real-time guarantees actually simplifies the security problem of preventing information leakage over shared-resource covert channels. We introduce a transformation for standard real-time resource locking protocols and show that protocols transformed in this way preserve the confidentiality guarantees of the schedulers on which they are based. Through this transformation, we were able to prove that four out of the seven investigated protocols are information-flow secure.
INDEX TERMS
Protocols, Schedules, Real-time systems, Timing, Program processors, Security, Observers,resources, covert channels, information-flow security, real-time systems
CITATION
M. Volp, B. Engel, C. Hamann, H. Hartig, "On confidentiality-preserving real-time locking protocols", 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS), vol. 00, no. , pp. 153-162, 2013, doi:10.1109/RTAS.2013.6531088
101 ms
(Ver 3.3 (11022016))