A trustenclave-based architecture for ensuring run-time security in embedded terminals
R Chang, L Jiang, W Chen, Y Xie… - Tsinghua Science and …, 2017 - ieeexplore.ieee.org
The run-time security guarantee is a hotspot in current cyberspace security research,
especially on embedded terminals, such as smart hardware as well as wearable and mobile …
especially on embedded terminals, such as smart hardware as well as wearable and mobile …
Randomization as mitigation of directed timing inference based attacks on time-triggered real-time systems with task replication
Time-triggered real-time systems achieve deterministic behavior using schedules that are
constructed offline, based on scheduling constraints. Their deterministic behavior makes …
constructed offline, based on scheduling constraints. Their deterministic behavior makes …
A secure algorithm for task scheduling against side-channel attacks
C Bao, A Srivastava - Proceedings of the 4th International Workshop on …, 2014 - dl.acm.org
The problem of ordering task executions has been well studied under power, performance,
and thermal constraints. However, it has been pursued less under security concerns. We …
and thermal constraints. However, it has been pursued less under security concerns. We …
Integrating security constraints into fixed priority real-time schedulers
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
Covert timing channel design for uniprocessor real-time systems
J Kwak, J Lee - Parallel and Distributed Computing, Applications and …, 2019 - Springer
Different from a general-purpose system, a real-time system requires stringent timing
guarantees. While existing offline analysis techniques can provide timing guarantees using …
guarantees. While existing offline analysis techniques can provide timing guarantees using …
[PDF][PDF] Schedule-based side-channel attack in fixed-priority real-time systems
Security failures in real-time embedded systems can have catastrophic effects and can lead
to injury to (or even loss of life for) humans, damage to the system and also environmental …
to injury to (or even loss of life for) humans, damage to the system and also environmental …
Contego: An adaptive framework for integrating security tasks in real-time systems
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …
unknown security flaws, and threats to RTS are growing in both number and sophistication …
Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
Optimizing Memory-Corruption Security Defenses for Real-Time Systems
A Horne - 2022 - dspace.mit.edu
Real-Time Systems (RTSs) frequently suffer from memory-corruption attacks. Compared to
general-purpose systems, RTSs differ because of their scheduling requirements. For this …
general-purpose systems, RTSs differ because of their scheduling requirements. For this …
Improving security for time-triggered real-time systems against timing inference based attacks by schedule obfuscation
K Krüger, G Fohler, M Volp - Work-in-Progress Proceedings ECRTS'17, 2017 - orbilu.uni.lu
Covert timing channels in real-time systems allow adversaries to not only exfiltrate
application secrets but also to mount timing inference based attacks. Much effort has been …
application secrets but also to mount timing inference based attacks. Much effort has been …