Presentation is loading. Please wait.

Presentation is loading. Please wait.

Making Real-time Systems Survive Malicious Attacks Partha Pal Joe Loyall, Franklin Webber, Rick Schantz BBN Technologies.

Similar presentations


Presentation on theme: "Making Real-time Systems Survive Malicious Attacks Partha Pal Joe Loyall, Franklin Webber, Rick Schantz BBN Technologies."— Presentation transcript:

1 Making Real-time Systems Survive Malicious Attacks Partha Pal Joe Loyall, Franklin Webber, Rick Schantz BBN Technologies

2 Trends in Critical Real-time and Embedded Systems Pose Challenges for Survivability Applications are network centric and distributed Stringent QoS requirements, including real-time control and data transfer Resources are constrained and shared Operate in dynamic and often hostile environments Applications are increasingly capable and complex Factors contributing to the threat: Civilian Signal Analysis And Geolocation Disaster Response Systems Military A trend of more and larger scale distributed real-time embedded systems that operate in dynamic networked environments Industrial Production Utility Resources Gracefully handle degraded and hostile situations Effectively utilize resources These systems need to handle dynamic conditions effectively and predictably Successful attack on such systems can incur heavy financial loss and human cost Assumptions about the environment Violation of RT QoS = success for attacker Increased accessibility and interconnectivity

3 {RT} {Survivability}: Challenges Can we shield the RT application from the fatal manipulation of the environment by the adversary? U Can we deny the adversary the privilege of succeeding just by breaking RT QoS? Experience in survivable systems of non-real-time kind: complete attack prevention is impossible some attacks may not even be detected in time Can we minimize and localize attack-induced failures? better design (containment)? adaptive (isolation, dynamic scheduling)? Can we recover from, or tolerate the attack-induced failures? provisioning? more adaptive capabilities? Once designed and implemented how can we validate, rate, certify such a system? Next best choice Prevent the “total success” scenario or make it very hard to achieve Overarching themes that underscore the design and implementation:

4 {RT} {Survivability}: Why Now? U However, a larger scale initiative is needed to make significant progress Now is the right time Significant strides in real-time QoS-aware adaptive distributed systems New high-water mark established in survivable system design Benefits from cross-fertilization goes both ways Real-time systems that can survive malicious attacks – much needed Survivable systems with timeliness attributes – aids real-life adoption Before such a substantial and coordinate research is launched, what should the community do? Deepen our understanding of the issues Frame the big-picture problem for the larger community (RT U Survivability) Address sub-problems to install confidence in the customers/sponsors Work is continuing in real-time and survivability areas – but to date, not enough cross-fertilization!


Download ppt "Making Real-time Systems Survive Malicious Attacks Partha Pal Joe Loyall, Franklin Webber, Rick Schantz BBN Technologies."

Similar presentations


Ads by Google