Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/88797
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorLiu, SR-
dc.creatorYi, W-
dc.date.accessioned2020-12-22T01:08:02Z-
dc.date.available2020-12-22T01:08:02Z-
dc.identifier.urihttp://hdl.handle.net/10397/88797-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rightsThis work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/en_US
dc.rightsThe following publication Liu, S. R., & Yi, W. (2020). Task parameters analysis in schedule-based timing side-channel attack. IEEE Access, 8, 157103-157115 is available at https://dx.doi.org/10.1109/ACCESS.2020.3019323en_US
dc.subjectTask analysisen_US
dc.subjectSide-Channel attacksen_US
dc.subjectReal-Time systemsen_US
dc.subjectTimingen_US
dc.subjectSchedulesen_US
dc.subjectCyber-Physical systemsen_US
dc.subjectReal-Time systemsen_US
dc.subjectSide-Channel attacksen_US
dc.subjectTask parameters analysisen_US
dc.subjectSignal analysisen_US
dc.titleTask parameters analysis in schedule-based timing side-channel attacken_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage157103-
dc.identifier.epage157115-
dc.identifier.volume8-
dc.identifier.doi10.1109/ACCESS.2020.3019323-
dcterms.abstractRecent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks. An important assumption in this type of attacks is the prior knowledge of attackers about the task parameter information, including the number of tasks in the system and the period and execution time of each task. The attackers can use such information, together with the execution sequence of the task system, to reconstruct the exact schedule of the tasks and perform various subsequent attacks. In this paper, we show that the schedule-based timing side channel attacks can actually be performed even without knowing the task parameter information in prior. We develop methods to infer the number of tasks in the system and the period and execution time of each task directly from the execution sequence. This removes the task parameter prior knowledge requirement of the attackers and shows greater threats of the schedule-based timing side channel attacks. Both simulation experiments with synthetic task sets and a Zedboard-based evaluation with control system for a 3DOF helicopter are conducted to evaluate the proposed task parameter analysis method.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE access, . . 2020, , v. 8, p. 157103-157115-
dcterms.isPartOfIEEE access-
dcterms.issued2020-
dc.identifier.isiWOS:000568437100001-
dc.identifier.scopus2-s2.0-85091247962-
dc.identifier.eissn2169-3536-
dc.description.validate202012 bcrc-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Liu_Task_Parameters_Schedule-Based.pdf1.9 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

55
Last Week
0
Last month
Citations as of May 19, 2024

Downloads

12
Citations as of May 19, 2024

SCOPUSTM   
Citations

5
Citations as of May 16, 2024

WEB OF SCIENCETM
Citations

1
Citations as of May 16, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.