to injury to (or even loss of life for) humans, damage to the system and also environmental
fallouts. Until recently security was an afterthought in the design of such systems. Even less
understood are attack mechanisms that target real-time systems. In this paper we present a
novel attack model and algorithm to extract the exact schedules of real-time systems
designed using fixed priority algorithms. The attack is demonstrated on a real hardware …