{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:05:41Z","timestamp":1742929541562,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359064"},{"type":"electronic","value":"9789811359071"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5907-1_17","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T07:01:52Z","timestamp":1549522912000},"page":"159-168","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Covert Timing Channel Design for Uniprocessor Real-Time Systems"],"prefix":"10.1007","author":[{"given":"Jaeheon","family":"Kwak","sequence":"first","affiliation":[]},{"given":"Jinkyu","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/321738.321743","volume":"20","author":"CL Liu","year":"1973","unstructured":"Liu, C.L., Layland, J.W.: Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM (JACM) 20(1), 46\u201361 (1973)","journal-title":"J. ACM (JACM)"},{"key":"17_CR2","unstructured":"Liu, F., Narayanan, A., Bai, Q.: Real-time systems (2000)"},{"key":"17_CR3","unstructured":"Hansen, J., Hissam, S., Moreno, G.A.: Statistical-based WCET estimation and validation. In: OASIcs-OpenAccess Series in Informatics, vol. 10. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2009)"},{"key":"17_CR4","unstructured":"Bernat, G., Colin, A., Petters, S.M.: WCET analysis of probabilistic hard real-time systems. In: null, p. 279. IEEE, December 2002"},{"key":"17_CR5","unstructured":"Edgar, S., Burns, A.: Statistical analysis of WCET for scheduling. In: 2001 22nd IEEE Proceedings of Real-Time Systems Symposium, (RTSS 2001), pp. 215\u2013224. IEEE, December 2001"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). \n                    https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"17_CR7","unstructured":"Son, J.: Covert timing channel analysis of rate monotonic real-time scheduling algorithm in MLS systems. In: 2006 IEEE Information Assurance Workshop, pp. 361\u2013368. IEEE, June 2006"},{"key":"17_CR8","unstructured":"Chen, C.Y., et al.: Schedule-based side-channel attack in fixed-priority real-time systems (2015)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"V\u00f6lp, M., Hamann, C.J., H\u00e4rtig, H.: Avoiding timing channels in fixed-priority schedulers. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, pp. 44\u201355. ACM, March 2008","DOI":"10.1145\/1368310.1368320"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Yoon, M.K., Mohan, S., Chen, C.Y., Sha, L.: TaskShuffler: a schedule randomization protocol for obfuscation against timing inference attacks in real-time systems. In: 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp. 1\u201312. IEEE, April 2016","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Pellizzoni, R., Paryab, N., Yoon, M.K., Bak, S., Mohan, S., Bobba, R.B.: A generalized model for preventing information leakage in hard real-time systems. In: 2015 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp. 271\u2013282. IEEE, April 2015","DOI":"10.1109\/RTAS.2015.7108450"},{"issue":"5","key":"17_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1007\/s11241-016-9252-5","volume":"52","author":"S Mohan","year":"2016","unstructured":"Mohan, S., Yoon, M.K., Pellizzoni, R., Bobba, R.B.: Integrating security constraints into fixed priority real-time schedulers. Real-Time Syst. 52(5), 644\u2013674 (2016)","journal-title":"Real-Time Syst."},{"issue":"3\u20134","key":"17_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3233\/JCS-1992-13-403","volume":"1","author":"JC Wray","year":"1992","unstructured":"Wray, J.C.: An analysis of covert timing channels. J. Comput. Secur. 1(3\u20134), 219\u2013232 (1992)","journal-title":"J. Comput. Secur."},{"key":"17_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974","volume-title":"Information Security: Principles and Practice","author":"M Stamp","year":"2011","unstructured":"Stamp, M.: Information Security: Principles and Practice. Wiley, New York (2011)"},{"key":"17_CR15","volume-title":"Statistics of Extremes","author":"EJ Gumbel","year":"2012","unstructured":"Gumbel, E.J.: Statistics of Extremes. Courier Corporation, Mineola (2012)"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/5.259427","volume":"82","author":"L Sha","year":"1994","unstructured":"Sha, L., Rajkumar, R., Sathaye, S.S.: Generalized rate-monotonic scheduling theory: a framework for developing real-time systems. Proc. IEEE 82(1), 68\u201382 (1994)","journal-title":"Proc. IEEE"},{"key":"17_CR17","unstructured":"Jaeheon, K., Jinkyu, L.: Covert timing channel considering execution time distribution in real-time systems. In: Korea Computer Congress (KCC), pp. 1920\u20131922 (2017)"}],"container-title":["Communications in Computer and Information Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5907-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:02:16Z","timestamp":1558396936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5907-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359064","9789811359071"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5907-1_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.pdcat2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}