A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems

11/13/2017
by   Monowar Hasan, et al.
0

The increased capabilities of modern real-time systems (RTS) expose them to various security threats. Recently, frameworks that integrate security tasks without perturbing the real-time tasks have been proposed, but they only target single core systems. However, modern RTS are migrating towards multicore platforms. This makes the problem of integrating security mechanisms more complex, as designers now have multiple choices for where to allocate the security tasks. In this paper we propose HYDRA, a design space exploration algorithm that finds an allocation of security tasks for multicore RTS using the concept of opportunistic execution. HYDRA allows security tasks to operate with existing real-time tasks without perturbing system parameters or normal execution patterns, while still meeting the desired monitoring frequency for intrusion detection. Our evaluation uses a representative real-time control system (along with synthetic task sets for a broader exploration) to illustrate the efficacy of HYDRA.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/27/2019

Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems

We propose a design-time framework (named HYDRA-C) for integrating secur...
research
04/29/2017

Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems

Embedded real-time systems (RTS) are pervasive. Many modern RTS are expo...
research
12/07/2020

Real-time monitoring as a supplementary security component of vigilantism in modern network environments

The phenomenon of network vigilantism is autonomously attributed to how ...
research
08/04/2022

Ellipsis: Towards Efficient System Auditing for Real-Time Systems

System auditing is a powerful tool that provides insight into the nature...
research
03/22/2010

Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has ...
research
08/18/2018

Runtime Analysis of Whole-System Provenance

Identifying the root cause and impact of a system intrusion remains a fo...
research
03/01/2020

Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system

UASs form a large part of the fighting ability of the advanced military ...

Please sign up or login with your details

Forgot password? Click here to reset