Combined Security and Schedulability Analysis for MILS Real-Time Critical Architectures

Authors Ill-ham Atchadam, Frank Singhoff, Hai Nam Tran, Noura Bouzid, Laurent Lemarchand



PDF
Thumbnail PDF

File

OASIcs.CERTS.2019.1.pdf
  • Filesize: 0.51 MB
  • 12 pages

Document Identifiers

Author Details

Ill-ham Atchadam
  • University of Brest, Lab-STICC, CNRS UMR 6285, France
Frank Singhoff
  • University of Brest, Lab-STICC, CNRS UMR 6285, France
Hai Nam Tran
  • University of Brest, Lab-STICC, CNRS UMR 6285, France
Noura Bouzid
  • University of Brest, Lab-STICC, CNRS UMR 6285, France
Laurent Lemarchand
  • University of Brest, Lab-STICC, CNRS UMR 6285, France

Cite AsGet BibTex

Ill-ham Atchadam, Frank Singhoff, Hai Nam Tran, Noura Bouzid, and Laurent Lemarchand. Combined Security and Schedulability Analysis for MILS Real-Time Critical Architectures. In 4th International Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS 2019). Open Access Series in Informatics (OASIcs), Volume 73, pp. 1:1-1:12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
https://doi.org/10.4230/OASIcs.CERTS.2019.1

Abstract

Real-time critical systems have to comply with stringent timing constraints, otherwise, disastrous consequences can occur at runtime. A large effort has been made to propose models and tools to verify timing constraints by schedulability analysis at the early stages of system designs. Fewer efforts have been made on verifying the security properties in these systems despite the fact that sinister consequences can also happen if these properties are compromised. In this article, we investigate how to jointly verify security and timing constraints. We show how to model a security architecture (MILS) and how to verify both timing constraints and security properties. Schedulability is investigated by the mean of scheduling analysis methods implemented into the Cheddar scheduling analyzer. Experiments are conducted to show the impact that improving security has on the schedulability analysis.

Subject Classification

ACM Subject Classification
  • Software and its engineering
  • Computer systems organization → Real-time system architecture
Keywords
  • MILS (Multi Independent Levels of Security)
  • RTCS (Real-Time Critical Systems)
  • Security architecture and models
  • Scheduling analysis
  • Security analysis

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Jim Alves-Foss, Paul W Oman, Carol Taylor, and Scott Harrison. The MILS architecture for high-assurance embedded systems. IJES, 2(3/4):239-247, 2006. Google Scholar
  2. R William Beckwith, W Mark Vanfleet, and Lee MacLaren. High assurance security/safety for deeply embedded, real-time systems. In Proceedings of the Embedded Systems Conference. Citeseer, 2004. Google Scholar
  3. D Elliott Bell and Leonard J La Padula. Secure computer system: Unified exposition and multics interpretation. Technical report, MITRE CORP BEDFORD MA, 1976. Google Scholar
  4. Kenneth J Biba. Integrity considerations for secure computer systems. Technical report, MITRE CORP BEDFORD MA, 1977. Google Scholar
  5. Carolyn Boettcher, Rance DeLong, John Rushby, and Wilmar Sifre. The MILS component integration approach to secure information sharing. In 2008 IEEE/AIAA 27th Digital Avionics Systems Conference, pages 1-C. IEEE, 2008. Google Scholar
  6. Eric Conrad, Seth Misenar, and Joshua Feldman. Eleventh Hour CISSP. Elsevier, 2013. Google Scholar
  7. Wei Dai. Crypto++ 5.6.0 Benchmarks. URL: https://www.cryptopp.com/benchmarks.html.
  8. Julien Delange, Laurent Pautet, and Fabrice Kordon. Design, Verification and Implementation of MILS systems. In Proceedings of the 21th International Symposium on Rapid System Prototyping, pages 1-8, 2010. Google Scholar
  9. Lei Gong, Lu Tian, and Fulian Zhang. Application information flow non-interference transmission model. In Proceedings of 2011 Int. Conf. on Electronic &Mechanical Engineering and Information Technology, volume 5, pages 2306-2309. IEEE, 2011. Google Scholar
  10. G Scott Graham and Peter J Denning. Protection: principles and practice. In Proceedings of Spring Joint Computer conference, pages 417-429. ACM, 1972. Google Scholar
  11. Jörgen Hansson, Peter H Feiler, and John Morley. Building secure systems using model-based engineering and architectural models. Technical report, CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2008. Google Scholar
  12. OH Holger Blasum and S Tverdyshev. Euro-mils: Secure european virtualisation for trustworthy applications in critical domains-formal methods used. Google Scholar
  13. Chung Laung Liu and James W Layland. Scheduling algorithms for multiprogramming in a hard-real-time environment. Journal of the ACM (JACM), 20(1):46-61, 1973. Google Scholar
  14. Francois Mouton, Alastair Nottingham, Louise Leenen, and HS Venter. Underlying finite state machine for the social engineering attack detection model. In 2017 Information Security for South Africa (ISSA), pages 98-105. IEEE, 2017. Google Scholar
  15. Kevin Müller, Michael Paulitsch, Sergey Tverdyshev, and Holger Blasum. MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures. In IEEE/IFIP Int. Conf. on Dependable Systems and Networks Workshops (DSN 2012). IEEE, 2012. Google Scholar
  16. Barack Obama. Executive Order 13526: Classified National Security Information. In United States. Office of the Federal Register. United States. Office of the Federal Register, 2009. Google Scholar
  17. Claire Pagetti, David Saussié, Romain Gratia, Eric Noulard, and Pierre Siron. The ROSACE case study: From simulink specification to multi/many-core execution. In Real-Time and Embedded Technology and Applications Symposium (RTAS), 2014 IEEE 20th, pages 309-318. IEEE, 2014. Google Scholar
  18. Ismael Ripoll, Miguel Masmano, Vicent Brocal, Salvador Peiró, Patricia Balbastre, Alfons Crespo, Paul Arberet, and Jean-Jacques Metge. Configuration and Scheduling tools for TSP systems based on XtratuM. Data Systems In Aerospace (DASIA 2010), 2010. Google Scholar
  19. Benjamin Rouxel and Isabelle Puaut. STR2RTS: Refactored StreamIT benchmarks into statically analyzable parallel benchmarks for WCET estimation &real-time scheduling. In 17th International Workshop on Worst-Case Execution Time Analysis (WCET 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017. Google Scholar
  20. SAE. Architecture Analysis &Design Laguage v2.0 (AS5506), September 2008. Google Scholar
  21. Frank Singhoff, Jérôme Legrand, Laurent Nana, and Lionel Marcé. Cheddar: a flexible real time scheduling framework. In ACM SIGAda Ada Letters, volume 24. ACM, 2004. Google Scholar
  22. Ming-Xin Yang, Li-Na Yuan, and Zhi-Xia Yang. A discuss of computer security strategy models. In 2010 Int. Conf. on Machine Learning and Cybernetics, volume 2, pages 839-842. IEEE, 2010. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail