A trustenclave-based architecture for ensuring run-time security in embedded terminals

R Chang, L Jiang, W Chen, Y Xie… - Tsinghua Science and …, 2017 - ieeexplore.ieee.org
The run-time security guarantee is a hotspot in current cyberspace security research,
especially on embedded terminals, such as smart hardware as well as wearable and mobile …

Randomization as mitigation of directed timing inference based attacks on time-triggered real-time systems with task replication

K Krüger, N Vreman, R Pates, M Maggio, M Völp… - 2021 - drops.dagstuhl.de
Time-triggered real-time systems achieve deterministic behavior using schedules that are
constructed offline, based on scheduling constraints. Their deterministic behavior makes …

A secure algorithm for task scheduling against side-channel attacks

C Bao, A Srivastava - Proceedings of the 4th International Workshop on …, 2014 - dl.acm.org
The problem of ordering task executions has been well studied under power, performance,
and thermal constraints. However, it has been pursued less under security concerns. We …

Integrating security constraints into fixed priority real-time schedulers

S Mohan, MK Yoon, R Pellizzoni, RB Bobba - Real-Time Systems, 2016 - Springer
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …

Covert timing channel design for uniprocessor real-time systems

J Kwak, J Lee - Parallel and Distributed Computing, Applications and …, 2019 - Springer
Different from a general-purpose system, a real-time system requires stringent timing
guarantees. While existing offline analysis techniques can provide timing guarantees using …

[PDF][PDF] Schedule-based side-channel attack in fixed-priority real-time systems

CY Chen, A Ghassami, S Nagy, MK Yoon, S Mohan… - 2015 - ideals.illinois.edu
Security failures in real-time embedded systems can have catastrophic effects and can lead
to injury to (or even loss of life for) humans, damage to the system and also environmental …

Contego: An adaptive framework for integrating security tasks in real-time systems

M Hasan, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2017 - arxiv.org
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

Optimizing Memory-Corruption Security Defenses for Real-Time Systems

A Horne - 2022 - dspace.mit.edu
Real-Time Systems (RTSs) frequently suffer from memory-corruption attacks. Compared to
general-purpose systems, RTSs differ because of their scheduling requirements. For this …

Improving security for time-triggered real-time systems against timing inference based attacks by schedule obfuscation

K Krüger, G Fohler, M Volp - Work-in-Progress Proceedings ECRTS'17, 2017 - orbilu.uni.lu
Covert timing channels in real-time systems allow adversaries to not only exfiltrate
application secrets but also to mount timing inference based attacks. Much effort has been …