{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:50:48Z","timestamp":1749271848200},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,17]]},"DOI":"10.1109\/isorc52572.2022.9812766","type":"proceedings-article","created":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T15:42:30Z","timestamp":1657122150000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Security-Cognizant Real-Time Scheduling"],"prefix":"10.1109","author":[{"given":"Sanjoy","family":"Baruah","sequence":"first","affiliation":[{"name":"Washington University in St. Louis"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/RTAS.2019.00017"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/321738.321743"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/REAL.1990.128746"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/BF01094342"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/BF01995675"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ECRTS.2005.32"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TII.2010.2049654"},{"key":"ref17","first-page":"13","article-title":"Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems","author":"son","year":"2006","journal-title":"Proceedings of the Third IASTED International Conference on Communication Network and Information Security"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"ref19","first-page":"22:1","article-title":"Vulnerability Analysis and Mitigation of Directed Timing Inference Based Attacks on Time-Triggered Systems","author":"kr\u00fcger","year":"2018","journal-title":"30th Euromicro Conference on Real-Time Systems (ECRTS 2018) volume 106 of Leibniz International Proceedings in Informatics (LIPIcs)"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/RTAS.2013.6531076"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1368310.1368320"},{"key":"ref6","first-page":"271","article-title":"A generalized model for preventing information leakage in hard realtime systems","author":"pellizzoni","year":"2015","journal-title":"IEEE Real-Time and Embedded Technology and Applications Symposium"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ECRTS.2014.28"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/RTSS.2016.021"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"ref2","first-page":"104","article-title":"Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems","author":"kocher","year":"1996","journal-title":"Advances in Cryptology &#x2014; CRYPTO &#x2019;96"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/RTAS.2019.00016"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/BF01995673"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/RTSS.2017.00013"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/3356401.3356419"},{"key":"ref21","first-page":"2:1","article-title":"Control-Flow Integrity for Real-Time Embedded Systems","author":"walls","year":"2019","journal-title":"31st Euromicro Conference on Real-Time Systems (ECRTS 2019) volume 133 of Leibniz International Proceedings in Informatics (LIPIcs)"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/RTAS.2013.6531081"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/DATE.2007.364534"},{"key":"ref25","article-title":"Task management techniques for enforcing ED scheduling on a periodic task set","author":"mok","year":"1988","journal-title":"Proc Workshop Real-Time Operating Systems and Software"}],"event":{"name":"2022 IEEE 25th International Symposium On Real-Time Distributed Computing (ISORC)","start":{"date-parts":[[2022,5,17]]},"location":"V\u00e4ster\u00e5s, Sweden","end":{"date-parts":[[2022,5,18]]}},"container-title":["2022 IEEE 25th International Symposium On Real-Time Distributed Computing (ISORC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9812705\/9812710\/09812766.pdf?arnumber=9812766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T20:45:57Z","timestamp":1659645957000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9812766\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isorc52572.2022.9812766","relation":{},"subject":[],"published":{"date-parts":[[2022,5,17]]}}}