{"title":"一种安全关键型实时系统漏洞优化方法","authors":"Xia Zhang, Jinyu Zhan, Wei Jiang, Yuexi Ma","doi":"10.1109/NAS.2013.34","DOIUrl":null,"url":null,"abstract":"In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which is based on dynamic programming algorithm, is devised to obtain minimal vulnerability under strict timing constraints. Furthermore, we take task criticality into consideration because each task is not equally important to its system. Finally, simulation experiments demonstrate the effectiveness of this method.","PeriodicalId":213334,"journal":{"name":"2013 IEEE Eighth International Conference on Networking, Architecture and Storage","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Vulnerability Optimization Method for Security-Critical Real-Time Systems\",\"authors\":\"Xia Zhang, Jinyu Zhan, Wei Jiang, Yuexi Ma\",\"doi\":\"10.1109/NAS.2013.34\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which is based on dynamic programming algorithm, is devised to obtain minimal vulnerability under strict timing constraints. Furthermore, we take task criticality into consideration because each task is not equally important to its system. Finally, simulation experiments demonstrate the effectiveness of this method.\",\"PeriodicalId\":213334,\"journal\":{\"name\":\"2013 IEEE Eighth International Conference on Networking, Architecture and Storage\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Eighth International Conference on Networking, Architecture and Storage\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAS.2013.34\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Eighth International Conference on Networking, Architecture and Storage","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAS.2013.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Vulnerability Optimization Method for Security-Critical Real-Time Systems
In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which is based on dynamic programming algorithm, is devised to obtain minimal vulnerability under strict timing constraints. Furthermore, we take task criticality into consideration because each task is not equally important to its system. Finally, simulation experiments demonstrate the effectiveness of this method.