An Improved Security-Cognizant Scheduling Model

Fatima Raadia, Nathan Fisher, Thidapat Chantem, Sanjoy Baruah

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Security is increasingly a primary concern in the design of safety-critical embedded systems, yet balancing it with timing constraints is challenging due to limited computing resources. The Multi-Phase Secure (MPS) Sporadic Task Model, proposed in an ISORC-2023 paper, addressed this by balancing overhead from security mechanisms (e.g., trusted-execution environments) with real-time scheduling constraints. However, this model assumed a somewhat pessimistic view of the overhead involved in switching between security mechanisms, often overestimating the necessity of these switches. This paper refines the MPS Sporadic Task Model to more accurately assess when switching security mechanisms is unnecessary, thereby avoiding undue overhead. Our refined model demonstrates a substantial improvement in the schedulability ratio when the utilization of the system approaches one (approximately 15% improvement) for randomly-generated security-aware task systems.

Original languageEnglish
Title of host publicationProceedings - 2024 IEEE 27th International Symposium on Real-Time Distributed Computing, ISORC 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350371284
DOIs
StatePublished - 2024
Event27th IEEE International Symposium on Real-Time Distributed Computing, ISORC 2024 - Tunis, Tunisia
Duration: May 22 2024May 25 2024

Publication series

NameProceedings - 2024 IEEE 27th International Symposium on Real-Time Distributed Computing, ISORC 2024

Conference

Conference27th IEEE International Symposium on Real-Time Distributed Computing, ISORC 2024
Country/TerritoryTunisia
CityTunis
Period05/22/2405/25/24

Keywords

  • Earliest-Deadline First
  • Embedded System Security
  • Graph Transformation
  • Limited-Preemption Scheduling

Fingerprint

Dive into the research topics of 'An Improved Security-Cognizant Scheduling Model'. Together they form a unique fingerprint.

Cite this