Automatic software timing attack evaluation & mitigation on clear hardware assumption

P Chakraborty - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Embedded systems are widely used for implementing diverse Internet-of-Things (IoT)
applications. These applications often deal with secret/sensitive data and encryption keys …

[PDF][PDF] Ertos: Enclaves in real-time operating systems

A Thomas, S Kaminsky, D Lee, D Song, K Asanovic - Woodstock, 2018 - carrv.github.io
With the growing popularity of edge computing and Internet of Things (IoT) devices, there is
an increased need for secure computation on embedded devices. Typically, embedded …

Impact of priority assignment on schedule-based attacks in real-time embedded systems

SY Karin, H Aydin, D Zhu, S Drager… - Journal of Systems …, 2023 - Elsevier
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …

AutoCC: Automatic Discovery of Covert Channels in Time-Shared Hardware

M Orenes-Vera, H Yun, N Wistoff, G Heiser… - Proceedings of the 56th …, 2023 - dl.acm.org
Covert channels enable information leakage between security domains that should be
isolated by observing execution differences in shared hardware. These channels can …

Deterministically deterring timing attacks in deterland

W Wu, B Ford - arXiv preprint arXiv:1504.07070, 2015 - arxiv.org
The massive parallelism and resource sharing embodying today's cloud business model not
only exacerbate the security challenge of timing channels, but also undermine the viability of …

Triad: Trusted Timestamps in Untrusted Environments

G Fernandez, A Brito, C Fetzer - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We aim to provide trusted time measurement mechanisms to applications and cloud
infrastructure deployed in environments that could harbor potential adversaries, including …

Partitioned Real-Time Scheduling for Preventing Information Leakage

D Kang, I Jung, K Lee, H Baek - IEEE Access, 2022 - ieeexplore.ieee.org
Recent real-time systems have been gradually connected externally through the Internet. As
each subsystem constituting a system has been developed from different vendors, the …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …

Attacking schedule indistinguishability in real-time systems

D Sanyal - 2022 - ideals.illinois.edu
Abstract Real-Time Systems (RTS) have gained prominence in new domains such as
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …

Security-Driven Design of Real-Time Embedded Systems

K Jiang - 2015 - diva-portal.org
R eal-time embedded systems (RTESs) have been widely used in modern society. And it is
also very common to find them in safety and security critical applications, such as …