A formal framework for real-time information flow analysis
J Son, J Alves-Foss - computers & security, 2009 - Elsevier
We view Multi-Level Secure (MLS) real-time systems as systems in which MLS real-time
tasks are scheduled and execute, according to a scheduling algorithm employed by the …
tasks are scheduled and execute, according to a scheduling algorithm employed by the …
Parallelizing Trusted Execution Environments for Multicore Hard Real-Time Systems
T Mishra - 2019 - vtechworks.lib.vt.edu
Real-Time systems are defined not only by their logical correctness but also timeliness.
Modern real-time systems, such as those controlling industrial plants or the flight controller …
Modern real-time systems, such as those controlling industrial plants or the flight controller …
Time'sa Thief of Memory: Breaking Multi-tenant Isolation in TrustZones Through Timing Based Bidirectional Covert Channels
ARM TrustZone is a system-on-chip security solution that provides hardware guarantees to
isolate the untrusted applications running in the normal world from sensitive computation …
isolate the untrusted applications running in the normal world from sensitive computation …
Timedice: Schedulability-preserving priority inversion for mitigating covert timing channels between real-time partitions
Timing predictability is a precondition for successful communication over a covert timing
channel. Real-time systems are particularly vulnerable to timing channels because real-time …
channel. Real-time systems are particularly vulnerable to timing channels because real-time …
Trusense: Information leakage from trustzone
With the emergence of Internet of Things, mobile devices are generating more network traffic
than ever. TrustZone is a hardware-enabled trusted execution environment for ARM …
than ever. TrustZone is a hardware-enabled trusted execution environment for ARM …
MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems
While trusted execution environments (TEEs) provide industry standard security and
isolation, TEE requests through secure monitor calls (SMCs) attribute to large time overhead …
isolation, TEE requests through secure monitor calls (SMCs) attribute to large time overhead …
Improving security for time-triggered real-time systems with task replication
K Krüger, G Fohler, M Völp… - 2018 IEEE 24th …, 2018 - ieeexplore.ieee.org
Time-triggered real-time systems achieve deterministic behaviour, making them suitable for
safety-critical environments. However, this determinism also allows attackers to finetune …
safety-critical environments. However, this determinism also allows attackers to finetune …
Work-in-Progress: Securing Safety-Critical Control Tasks with Attack-aware Multi-Rate Scheduling
Modern cyber-physical systems (CPSs) consist of numerous control units interconnected by
communication networks. Each control unit is responsible for executing possibly multiple …
communication networks. Each control unit is responsible for executing possibly multiple …
Edge-rt: Os support for controlled latency in the multi-tenant, real-time edge
W Shao, B Ye, H Wang, G Parmer… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
Embedded and real-time devices in many domains are increasingly dependent on network
connectivity. The ability to offload computations encourages Cost, Size, Weight and Power …
connectivity. The ability to offload computations encourages Cost, Size, Weight and Power …
Applications and challenges in securing time
FM Anwar, M Srivastava - 12th USENIX Workshop on Cyber Security …, 2019 - usenix.org
In this paper, we establish the importance of trusted time for the safe and correct operation of
various applications. There are, however, challenges in securing time against hardware …
various applications. There are, however, challenges in securing time against hardware …