TY - GEN
T1 - Security-driven codesign with weakly-hard constraints for real-time embedded systems
AU - Liang, Hengyi
AU - Wang, Zhilu
AU - Roy, Debayan
AU - Dey, Soumyajit
AU - Chakraborty, Samarjit
AU - Zhu, Qi
N1 - Funding Information:
VII. ACKNOWLEDGEMENT We gratefully acknowledge the support from the US National Science Foundation awards 1834701, 1834324, 1839511, and 1724341; and Imprint India Project No. 6158.
Publisher Copyright:
© 2019 IEEE.
PY - 2019/11
Y1 - 2019/11
N2 - For many embedded systems, such as automotive electronic systems, security has become a pressing challenge. Limited resources and tight timing constraints often make it difficult to apply even lightweight authentication and intrusion detection schemes, especially when retrofitting existing designs. Moreover, traditional hard deadline assumption is insufficient to describe control tasks that have certain degrees of robustness and can tolerate some deadline misses while satisfying functional properties such as stability. In this work, we explore feasible weakly-hard constraints on control tasks, and then leverage the scheduling flexibility from those allowed misses to enhance system's capability for accommodating security monitoring tasks. We develop a co-design approach that 1) sets feasible weakly-hard constraints on control tasks based on quantitative analysis, ensuring the satisfaction of control stability and performance requirements; and 2) optimizes the allocation, priority, and period assignment of security monitoring tasks, improving system security while meeting timing constraints (including the weakly-hard constraints on control tasks). Experimental results on an industrial case study and a set of synthetic examples demonstrated the significant potential of leveraging weakly-hard constraints to improve security and the effectiveness of our approach in exploring the design space to fully realize such potential.
AB - For many embedded systems, such as automotive electronic systems, security has become a pressing challenge. Limited resources and tight timing constraints often make it difficult to apply even lightweight authentication and intrusion detection schemes, especially when retrofitting existing designs. Moreover, traditional hard deadline assumption is insufficient to describe control tasks that have certain degrees of robustness and can tolerate some deadline misses while satisfying functional properties such as stability. In this work, we explore feasible weakly-hard constraints on control tasks, and then leverage the scheduling flexibility from those allowed misses to enhance system's capability for accommodating security monitoring tasks. We develop a co-design approach that 1) sets feasible weakly-hard constraints on control tasks based on quantitative analysis, ensuring the satisfaction of control stability and performance requirements; and 2) optimizes the allocation, priority, and period assignment of security monitoring tasks, improving system security while meeting timing constraints (including the weakly-hard constraints on control tasks). Experimental results on an industrial case study and a set of synthetic examples demonstrated the significant potential of leveraging weakly-hard constraints to improve security and the effectiveness of our approach in exploring the design space to fully realize such potential.
KW - Control
KW - Real time
KW - Security
KW - Weakly hard
UR - http://www.scopus.com/inward/record.url?scp=85081158848&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85081158848&partnerID=8YFLogxK
U2 - 10.1109/ICCD46524.2019.00035
DO - 10.1109/ICCD46524.2019.00035
M3 - Conference contribution
AN - SCOPUS:85081158848
T3 - Proceedings - 2019 IEEE International Conference on Computer Design, ICCD 2019
SP - 217
EP - 226
BT - Proceedings - 2019 IEEE International Conference on Computer Design, ICCD 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 37th IEEE International Conference on Computer Design, ICCD 2019
Y2 - 17 November 2019 through 20 November 2019
ER -