Illinois researchers to advance security of real-time embedded system scheduling

10/25/2017 ITI Communications

A team led by Sibin Mohan has received funding to determine how to mitigate attacks that are intended to reveal a system's task scheduling information.

Written by ITI Communications

Real-time embedded systems form the backbone of automobiles, medical devices, and nuclear power plants, among other infrastructures. In addition to functioning in real time, these systems are often safety-critical, meaning that even a small interruption in normal operations could pose a threat to human safety.

Research Assistant Professor Sibin Mohan
Research Assistant Professor Sibin Mohan
Research Assistant Professor Sibin Mohan is working to create more secure and resilient real-time embedded systems through a three-year, $500,000 grant funded by the National Science Foundation. Through the project,” SaTC: Core: Small: An Exploration of Schedule-Based Vulnerabilities in Real-Time Embedded Systems,” Mohan’s team will work to develop methods that help protect these systems – which have not historically been developed with security in mind – against cyberattacks and other failures. This project is in collaboration with Affiliate Research Associate Professor Negar Kiyavash, a faculty member of the industrial and enterprise systems engineering and electrical and computer engineering departments. Mohan and Kiyavash are members of the Information Trust Institute at the University of Illinois.
Affiliate Research Associate Professor Negar Kiyavash
Affiliate Research Associate Professor Negar Kiyavash
“Not only must these systems work correctly, but they must also finish their operations in a fixed amount of time,” said Mohan. “If you wreck a car, it’s not helpful for safety systems to deploy five seconds after a crash. It needs to happen that millisecond.”

The project will assess the vulnerabilities in real-time systems, looking at, for example, how an adversary could extract critical information about system operation while remaining undetected. In this scenario, the hacker could use the information to launch later attacks on the same system.

In particular, Mohan will work to reconstruct the behavior of the system; in other words, he will determine the points in time (or the schedule) when tasks execute. The team will also evaluate the system’s vulnerabilities by developing methods to avoid detection during an attack.

Finally, the researchers will de­­velop new methods that make it difficult to carry out these attacks, on platforms that range from simulation engines to real hardware, such as FPGA boards. The team also will develop metrics to enable the evaluation of success.

While the NSF grant is focused on real-time embedded systems, Mohan says the research could apply to other cyber-physical systems, such as those that comprise the Internet of Things.

­­­

“The idea of reconstructing what is happening could be applicable to other systems that have repetitive behavior,” he said. “We want to improve the security of any system that is susceptible to the reconnaissance capabilities of an attacker.”


Share this story

This story was published October 25, 2017.