2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS) (2013)
Philadelphia, PA, USA USA
Apr. 9, 2013 to Apr. 11, 2013
M. Volp , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
B. Engel , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
C. Hamann , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
H. Hartig , Dept. of Comput. Sci., Tech. Univ. Dresden, Dresden, Germany
Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system. However, rather than exacerbating the problem, we found that considering real-time guarantees actually simplifies the security problem of preventing information leakage over shared-resource covert channels. We introduce a transformation for standard real-time resource locking protocols and show that protocols transformed in this way preserve the confidentiality guarantees of the schedulers on which they are based. Through this transformation, we were able to prove that four out of the seven investigated protocols are information-flow secure.
Protocols, Schedules, Real-time systems, Timing, Program processors, Security, Observers
M. Volp, B. Engel, C. Hamann and H. Hartig, "On confidentiality-preserving real-time locking protocols," 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS), Philadelphia, PA, USA USA, 2013, pp. 153-162.