Mad Monk: Arbitrary Criticality Escalation in Mixed Criticality Real-Time Systems

  • Mitchell Duncan
  • , Ao Li
  • , Nathan Fisher
  • , Ning Zhang
  • , Ryan Gerdes
  • , Tanmaya Mishra
  • , Thidapat Chantem

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In safety critical computing, real-time and security concerns are often considered separately, though the behavior of a scheduling model itself may be an attack surface which can be exploited by an attacker to reduce system performance. In this work, we explore how the semantics of mode changes in mixed-criticality systems could be used as one such attack vector. This attack, dubbed Mad Monk, uses a mixed criticality scheduler's mode switches against itself by allowing a task of a lower criticality to interfere with tasks of a higher criticality, thereby forcing a disruptive mode switch which could possibly reduce service to some tasks. We describe this attack in detail, along with a case study demonstrating its risk. Furthermore, extensive simulations of this attack demonstrate its potential effectiveness based on a variety of timing and system factors.

Original languageEnglish
Title of host publicationProceedings - 2025 28th International Symposium on Real-Time Distributed Computing, ISORC 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages60-71
Number of pages12
ISBN (Electronic)9798331599843
DOIs
StatePublished - 2025
Event28th IEEE International Symposium on Real-Time Distributed Computing, ISORC 2025 - Toulouse, France
Duration: May 26 2025May 28 2025

Publication series

NameProceedings - 2025 28th International Symposium on Real-Time Distributed Computing, ISORC 2025

Conference

Conference28th IEEE International Symposium on Real-Time Distributed Computing, ISORC 2025
Country/TerritoryFrance
CityToulouse
Period05/26/2505/28/25

Keywords

  • mixed criticality systems
  • real-time systems
  • security

Fingerprint

Dive into the research topics of 'Mad Monk: Arbitrary Criticality Escalation in Mixed Criticality Real-Time Systems'. Together they form a unique fingerprint.

Cite this