{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:56:03Z","timestamp":1763499363540,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1718952"],"award-info":[{"award-number":["1718952"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484769","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"666-684","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Indistinguishability Prevents Scheduler Side Channels in Real-Time Systems"],"prefix":"10.1145","author":[{"given":"Chien-Ying","family":"Chen","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Debopam","family":"Sanyal","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA"}]},{"given":"Sibin","family":"Mohan","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00010"},{"key":"e_1_3_2_1_2_1","volume-title":"Preserving Physical Safety Under Cyber Attacks","author":"Abdi Fardin","year":"2018","unstructured":"Fardin Abdi, Chien-Ying Chen, Monowar Hasan, Songran Liu, Sibin Mohan, and Marco Caccamo. 2018b. Preserving Physical Safety Under Cyber Attacks. IEEE Internet of Things Journal (2018)."},{"key":"e_1_3_2_1_3_1","volume-title":"International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 29--45","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal, Bruce Archambeault, Josyula R Rao, and Pankaj Rohatgi. 2002. The EM side-channel (s). In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 29--45."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050753"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"e_1_3_2_1_6_1","volume-title":"KDD workshop","volume":"10","author":"Berndt Donald J","year":"1994","unstructured":"Donald J Berndt and James Clifford. 1994. Using dynamic time warping to find patterns in time series.. In KDD workshop, Vol. 10. Seattle, WA, USA:, 359--370."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2049654"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Measuring the performance of schedulability tests","volume":"30","author":"Bini Enrico","year":"2005","unstructured":"Enrico Bini and Giorgio C Buttazzo. 2005. Measuring the performance of schedulability tests. RTS Journal, Vol. 30, 1--2 (2005), 129--154.","journal-title":"RTS Journal"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMRTS.2000.853996"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411496.3421224"},{"key":"e_1_3_2_1_11_1","volume-title":"Analysis of the cyber attack on the Ukrainian power grid","author":"Case Defense Use","year":"2016","unstructured":"Defense Use Case. 2016. Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC) (2016)."},{"key":"e_1_3_2_1_12_1","volume-title":"Tullio Vardanega, Liliana Cucu, Benoit Triquet, Guillem Bernat, Emery Berger, Jaume Abella, Franck Wartel, Michael Houston, et al.","author":"Cazorla Francisco J","year":"2013","unstructured":"Francisco J Cazorla, Eduardo Qui nones, Tullio Vardanega, Liliana Cucu, Benoit Triquet, Guillem Bernat, Emery Berger, Jaume Abella, Franck Wartel, Michael Houston, et al. 2013. Proartis: Probabilistically analyzable real-time systems. ACM Transactions on Embedded Computing Systems (2013)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00016"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1978246.1978332"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00040"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798915"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_19_1","volume-title":"Foundations and Trends\u00ae in Theoretical Computer Science","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20061549"},{"key":"e_1_3_2_1_21_1","unstructured":"Dario Faggioli Fabio Checconi Michael Trimarchi and Claudio Scordino. 2009. An EDF scheduling class for the Linux kernel. In Real-Time Linux Wkshp ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282563"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2438860"},{"volume-title":"Flask web development: developing web applications with python .\" O'Reilly Media","author":"Grinberg Miguel","key":"e_1_3_2_1_24_1","unstructured":"Miguel Grinberg. 2018. Flask web development: developing web applications with python .\" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2906568"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 9th Intl. Workshop on Worst-Case Execution Time (WCET) Analysis .","author":"Hansen Jeffery","year":"2009","unstructured":"Jeffery Hansen, Scott A Hissam, and Gabriel A Moreno. 2009. Statistical-based wcet estimation and validation. In Proceedings of the 9th Intl. Workshop on Worst-Case Execution Time (WCET) Analysis ."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2016.021"},{"key":"e_1_3_2_1_28_1","volume-title":"Differential private noise adding mechanism and its application on consensus. arXiv preprint arXiv:1611.08936","author":"He Jianping","year":"2016","unstructured":"Jianping He and Lin Cai. 2016. Differential private noise adding mechanism and its application on consensus. arXiv preprint arXiv:1611.08936 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"The bounded Laplace mechanism in differential privacy. arXiv preprint arXiv:1808.10410","author":"Holohan Naoise","year":"2018","unstructured":"Naoise Holohan, Spiros Antonatos, Stefano Braghin, and P\u00f3l Mac Aonghusa. 2018. The bounded Laplace mechanism in differential privacy. arXiv preprint arXiv:1808.10410 (2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566474"},{"key":"e_1_3_2_1_31_1","first-page":"179","article-title":"Vehicle crash analysis for airbag deployment decision","volume":"7","author":"Hussain Aini","year":"2006","unstructured":"Aini Hussain, M. A. Hannan, Azah Mohamed, Hilmi Sanusi, and A. K. Ariffin. 2006. Vehicle crash analysis for airbag deployment decision. International Journal of Automotive Technology, Vol. 7, 2 (2006), 179--185.","journal-title":"International Journal of Automotive Technology"},{"key":"e_1_3_2_1_32_1","unstructured":"Damir Isovic. 2001. Handling Sporadic Tasks in Real-time Systems: Combined Offline and Online Approach .M\"alardalen University."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2014.11"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2418194"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECRTS.2018.22"},{"volume-title":"Proceedings of the 2008 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. 137--146","author":"Lickly Ben","key":"e_1_3_2_1_37_1","unstructured":"Ben Lickly, Isaac Liu, Sungjun Kim, Hiren D. Patel, Stephen A. Edwards, and Edward A. Lee. 2008. Predictable Programming on a Precision Timed Architecture. In Proceedings of the 2008 International Conference on Compilers, Architectures and Synthesis for Embedded Systems. 137--146."},{"key":"e_1_3_2_1_38_1","volume-title":"CMBES Proceedings","volume":"42","author":"Rocha Lima Bruno Monteiro","year":"2019","unstructured":"Bruno Monteiro Rocha Lima, Luiz Claudio Sampaio Ramos, Thiago Eustaquio Alves de Oliveira, Vinicius Prado da Fonseca, and Emil M Petriu. 2019. Heart Rate Detection Using a Multimodal Tactile Sensor and a Z-score Based Peak Detection Algorithm. CMBES Proceedings, Vol. 42 (2019)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"C. L. Liu and J. W. Layland. 1973. Scheduling algorithms for multiprogramming in a hard real-time environment. J. ACM (1973).","DOI":"10.1145\/321738.321743"},{"key":"e_1_3_2_1_40_1","volume-title":"Statistical Properties of Sanitized Results from Differentially Private Laplace Mechanism with Univariate Bounding Constraints. arXiv preprint arXiv:1607.08554","author":"Liu Fang","year":"2016","unstructured":"Fang Liu. 2016. Statistical Properties of Sanitized Results from Differentially Private Laplace Mechanism with Univariate Bounding Constraints. arXiv preprint arXiv:1607.08554 (2016)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"e_1_3_2_1_42_1","volume-title":"Leaking your engine speed by spectrum analysis of real-Time scheduling sequences. Journal of Systems Architecture","author":"Liu Songran","year":"2019","unstructured":"Songran Liu, Nan Guan, Dong Ji, Weichen Liu, Xue Liu, and Wang Yi. 2019. Leaking your engine speed by spectrum analysis of real-Time scheduling sequences. Journal of Systems Architecture (2019)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015398403337"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2004.39"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.16"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2019.00017"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2015.7108450"},{"key":"e_1_3_2_1_50_1","unstructured":"David Schneider. 2015. Jeep Hacking 101. IEEE Spectrum (Aug 2015). http:\/\/spectrum.ieee.org\/cars-that-think\/transportation\/systems\/jeep-hacking-101."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23027"},{"key":"e_1_3_2_1_52_1","volume-title":"Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle. GPS World (August","author":"Shepard D.","year":"2012","unstructured":"D. Shepard, J. Bhatti, and T. Humphreys. 2012. Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle. GPS World (August 2012)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652117"},{"key":"e_1_3_2_1_54_1","volume-title":"Aicraft Hacking. In Fourth Annual HITB Security Conference in Europe .","author":"Teso Hugo","year":"2013","unstructured":"Hugo Teso. 2013. Aicraft Hacking. In Fourth Annual HITB Security Conference in Europe ."},{"volume-title":"Critical Infrastructure Security and Resilience","author":"Tsalis Nick","key":"e_1_3_2_1_55_1","unstructured":"Nick Tsalis, Efstratios Vasilellis, Despina Mentzelioti, and Theodore Apostolopoulos. 2019. A Taxonomy of Side Channel Attacks on Critical Infrastructures and Relevant Systems. In Critical Infrastructure Security and Resilience. Springer, 283--313."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368320"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9030144"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531088"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2658190"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2016.7461362"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055010"},{"key":"e_1_3_2_1_63_1","volume-title":"Blinder: Partition-Oblivious Hierarchical Scheduling. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Yoon Man-Ki","year":"2021","unstructured":"Man-Ki Yoon, Mengqi Liu, Hao Chen, Jung-Eun Kim, and Zhong Shao. 2021. Blinder: Partition-Oblivious Hierarchical Scheduling. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/yoon"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.37"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484769","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:51:20Z","timestamp":1763499080000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":64,"alternative-id":["10.1145\/3460120.3484769","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484769","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}