Skip to main content

Covert Timing Channel Design for Uniprocessor Real-Time Systems

  • Conference paper
  • First Online:
  • 822 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 931))

Abstract

Different from a general-purpose system, a real-time system requires stringent timing guarantees. While existing offline analysis techniques can provide timing guarantees using the worst-case execution time (WCET) of individual tasks, a variation of actual execution time makes it difficult to build covert timing channel. In this paper, we first present a novel covert timing channel, which considers actual execution time distribution of tasks and controls execution time to leak data between conspirators; we demonstrate that it is possible to leak data in real-time systems. Second, we suggest two enhancing techniques called S-R LCM (sender-receiver least common multiple) and noise area to reduce noise in communication. Through simulations, we demonstrate that our covert timing channel can serve trade-off between transmission speed and accuracy; that is, it shows average 50.2%, 54.6% and 51.3% accuracy for 100 test cases with thresholds 0, 1.4 and 2.8. Average 58.4% accuracy is accomplished with best threshold values for 100 test cases, and the maximum accuracy for a single test case is recorded 100.0%.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Liu, C.L., Layland, J.W.: Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM (JACM) 20(1), 46–61 (1973)

    Article  MathSciNet  Google Scholar 

  2. Liu, F., Narayanan, A., Bai, Q.: Real-time systems (2000)

    Google Scholar 

  3. Hansen, J., Hissam, S., Moreno, G.A.: Statistical-based WCET estimation and validation. In: OASIcs-OpenAccess Series in Informatics, vol. 10. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2009)

    Google Scholar 

  4. Bernat, G., Colin, A., Petters, S.M.: WCET analysis of probabilistic hard real-time systems. In: null, p. 279. IEEE, December 2002

    Google Scholar 

  5. Edgar, S., Burns, A.: Statistical analysis of WCET for scheduling. In: 2001 22nd IEEE Proceedings of Real-Time Systems Symposium, (RTSS 2001), pp. 215–224. IEEE, December 2001

    Google Scholar 

  6. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_9

    Chapter  Google Scholar 

  7. Son, J.: Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems. In: 2006 IEEE Information Assurance Workshop, pp. 361–368. IEEE, June 2006

    Google Scholar 

  8. Chen, C.Y., et al.: Schedule-based side-channel attack in fixed-priority real-time systems (2015)

    Google Scholar 

  9. Völp, M., Hamann, C.J., Härtig, H.: Avoiding timing channels in fixed-priority schedulers. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, pp. 44–55. ACM, March 2008

    Google Scholar 

  10. Yoon, M.K., Mohan, S., Chen, C.Y., Sha, L.: TaskShuffler: a schedule randomization protocol for obfuscation against timing inference attacks in real-time systems. In: 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp. 1–12. IEEE, April 2016

    Google Scholar 

  11. Pellizzoni, R., Paryab, N., Yoon, M.K., Bak, S., Mohan, S., Bobba, R.B.: A generalized model for preventing information leakage in hard real-time systems. In: 2015 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp. 271–282. IEEE, April 2015

    Google Scholar 

  12. Mohan, S., Yoon, M.K., Pellizzoni, R., Bobba, R.B.: Integrating security constraints into fixed priority real-time schedulers. Real-Time Syst. 52(5), 644–674 (2016)

    Article  Google Scholar 

  13. Wray, J.C.: An analysis of covert timing channels. J. Comput. Secur. 1(3–4), 219–232 (1992)

    Article  Google Scholar 

  14. Stamp, M.: Information Security: Principles and Practice. Wiley, New York (2011)

    Book  Google Scholar 

  15. Gumbel, E.J.: Statistics of Extremes. Courier Corporation, Mineola (2012)

    MATH  Google Scholar 

  16. Sha, L., Rajkumar, R., Sathaye, S.S.: Generalized rate-monotonic scheduling theory: a framework for developing real-time systems. Proc. IEEE 82(1), 68–82 (1994)

    Article  Google Scholar 

  17. Jaeheon, K., Jinkyu, L.: Covert timing channel considering execution time distribution in real-time systems. In: Korea Computer Congress (KCC), pp. 1920–1922 (2017)

    Google Scholar 

Download references

Acknowledgement

A short, earlier version of this paper has been presented as a domestic conference [17], which is 3-page-long.

This research was supported by the National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT (2017R1A2B2002458, 2017H1D8A2031628, 2017K2A9A1A01092689) and by the Ministry of Education (2018R1D1A1B07040321). This research was also supported by the IITP (Institute for Information & communications Technology Promotion) funded by the MSIT (Ministry of Science and ICT) (2015-0-00914, IITP-2017-2015-0-00742).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinkyu Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kwak, J., Lee, J. (2019). Covert Timing Channel Design for Uniprocessor Real-Time Systems. In: Park, J., Shen, H., Sung, Y., Tian, H. (eds) Parallel and Distributed Computing, Applications and Technologies. PDCAT 2018. Communications in Computer and Information Science, vol 931. Springer, Singapore. https://doi.org/10.1007/978-981-13-5907-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5907-1_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5906-4

  • Online ISBN: 978-981-13-5907-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics