[PDF][PDF] Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation
… As a result, after the real-time task finishes its execution, the system … explored utilizing such
time for additional system checks [25… integrates a code-switching Reference Monitor (RM) into …
time for additional system checks [25… integrates a code-switching Reference Monitor (RM) into …
Integrating security in resource-constrained cyber-physical systems
… over a real-time network with system sensors and actuators. … Furthermore, we introduce a
method for the opportunistic use … are especially dominant in legacy systems. For example, our …
method for the opportunistic use … are especially dominant in legacy systems. For example, our …
Integrating security into real-time cyber-physical systems
M Hasan - 2020 - ideals.illinois.edu
… My dissertation work explores the real-time security domain … allows the execution of security
tasks opportunistically with … integrating security tasks into RTS (especially legacy systems) …
tasks opportunistically with … integrating security tasks into RTS (especially legacy systems) …
Period adaptation for continuous security monitoring in multicore real-time systems
… In this paper we study mechanisms to integrate security monitoring for legacy multicore-… ,
“Exploring opportunistic execution for integrating security into legacy hard realtime systems,” in …
“Exploring opportunistic execution for integrating security into legacy hard realtime systems,” in …
SoK: Security in real-time systems
… security routines execute opportunistically when the system … of real-time task sets that
were generated) to explore the … security requirements (and vulnerabilities) of legacy systems …
were generated) to explore the … security requirements (and vulnerabilities) of legacy systems …
Defending Real-Time Systems through Timing-Aware Designs
T Mishra - 2022 - vtechworks.lib.vt.edu
… software execution, and applying such techniques to real-time … , legacy and connected
modern real-time systems alike will … Perseverance rover for Mars exploration uses a radiation-…
modern real-time systems alike will … Perseverance rover for Mars exploration uses a radiation-…
Safety-aware integration of hardware-assisted program tracing in mixed-criticality systems for security monitoring
M Kadar, G Fohler, D Kuzhiyelil… - … IEEE 27th Real-Time …, 2021 - ieeexplore.ieee.org
… to provide the assurance of the system predictability for a deployment into a mixed-criticality …
“Exploring opportunistic execution for integrating security into legacy hard real-time systems,…
“Exploring opportunistic execution for integrating security into legacy hard real-time systems,…
Maximizing the security level of real-time software while preserving temporal constraints
… , by combining opportunistic execution of security tasks with … Exploring opportunistic
execution for integrating security into legacy hard real-time systems,” in 2016 IEEE Real-Time …
execution for integrating security into legacy hard real-time systems,” in 2016 IEEE Real-Time …
A systematic review on security aware real-time task scheduling
S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
… conceived for legacy systems, ie, real-time control structures, … exploration algorithm, which
allocates the secured tasks to multi-core real-time systems through an opportunistic execution …
allocates the secured tasks to multi-core real-time systems through an opportunistic execution …
A security-aware hardware scheduler for modern multi-core systems with hard real-time constraints
… We consider that non-critical tasks are executed in the system to increase the system
performance, so … Attacks results: Attack results obtained from discovering critical tasks and …
performance, so … Attacks results: Attack results obtained from discovering critical tasks and …