[PDF][PDF] Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation

Y Wang, A Li, J Wang, S Baruah, N Zhang - … Conference on Security …, 2024 - usenix.org
… As a result, after the real-time task finishes its execution, the systemexplored utilizing such
time for additional system checks [25… integrates a code-switching Reference Monitor (RM) into

Integrating security in resource-constrained cyber-physical systems

V Lesi, I Jovanov, M Pajic - … Transactions on Cyber-Physical Systems, 2020 - dl.acm.org
… over a real-time network with system sensors and actuators. … Furthermore, we introduce a
method for the opportunistic use … are especially dominant in legacy systems. For example, our …

Integrating security into real-time cyber-physical systems

M Hasan - 2020 - ideals.illinois.edu
… My dissertation work explores the real-time security domain … allows the execution of security
tasks opportunistically with … integrating security tasks into RTS (especially legacy systems) …

Period adaptation for continuous security monitoring in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … , Automation & Test in …, 2020 - ieeexplore.ieee.org
… In this paper we study mechanisms to integrate security monitoring for legacy multicore-… ,
Exploring opportunistic execution for integrating security into legacy hard realtime systems,” in …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
security routines execute opportunistically when the system … of real-time task sets that
were generated) to explore the … security requirements (and vulnerabilities) of legacy systems

Defending Real-Time Systems through Timing-Aware Designs

T Mishra - 2022 - vtechworks.lib.vt.edu
… software execution, and applying such techniques to real-time … , legacy and connected
modern real-time systems alike will … Perseverance rover for Mars exploration uses a radiation-…

Safety-aware integration of hardware-assisted program tracing in mixed-criticality systems for security monitoring

M Kadar, G Fohler, D Kuzhiyelil… - … IEEE 27th Real-Time …, 2021 - ieeexplore.ieee.org
… to provide the assurance of the system predictability for a deployment into a mixed-criticality …
Exploring opportunistic execution for integrating security into legacy hard real-time systems,…

Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
… , by combining opportunistic execution of security tasks with … Exploring opportunistic
execution for integrating security into legacy hard real-time systems,” in 2016 IEEE Real-Time

A systematic review on security aware real-time task scheduling

S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
… conceived for legacy systems, ie, real-time control structures, … exploration algorithm, which
allocates the secured tasks to multi-core real-time systems through an opportunistic execution

A security-aware hardware scheduler for modern multi-core systems with hard real-time constraints

A Norollah, H Beitollahi, Z Kazemi, M Fazeli - Microprocessors and …, 2022 - Elsevier
… We consider that non-critical tasks are executed in the system to increase the system
performance, so … Attacks results: Attack results obtained from discovering critical tasks and …