Automatic software timing attack evaluation & mitigation on clear hardware assumption
P Chakraborty - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Embedded systems are widely used for implementing diverse Internet-of-Things (IoT)
applications. These applications often deal with secret/sensitive data and encryption keys …
applications. These applications often deal with secret/sensitive data and encryption keys …
[PDF][PDF] Ertos: Enclaves in real-time operating systems
With the growing popularity of edge computing and Internet of Things (IoT) devices, there is
an increased need for secure computation on embedded devices. Typically, embedded …
an increased need for secure computation on embedded devices. Typically, embedded …
Impact of priority assignment on schedule-based attacks in real-time embedded systems
In this paper, we investigate the impact of priority assignment on schedule-based attacks in
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
fixed-priority real-time systems. Through the schedule-based attacks, attackers may …
AutoCC: Automatic Discovery of Covert Channels in Time-Shared Hardware
Covert channels enable information leakage between security domains that should be
isolated by observing execution differences in shared hardware. These channels can …
isolated by observing execution differences in shared hardware. These channels can …
Deterministically deterring timing attacks in deterland
W Wu, B Ford - arXiv preprint arXiv:1504.07070, 2015 - arxiv.org
The massive parallelism and resource sharing embodying today's cloud business model not
only exacerbate the security challenge of timing channels, but also undermine the viability of …
only exacerbate the security challenge of timing channels, but also undermine the viability of …
Triad: Trusted Timestamps in Untrusted Environments
We aim to provide trusted time measurement mechanisms to applications and cloud
infrastructure deployed in environments that could harbor potential adversaries, including …
infrastructure deployed in environments that could harbor potential adversaries, including …
Partitioned Real-Time Scheduling for Preventing Information Leakage
D Kang, I Jung, K Lee, H Baek - IEEE Access, 2022 - ieeexplore.ieee.org
Recent real-time systems have been gradually connected externally through the Internet. As
each subsystem constituting a system has been developed from different vendors, the …
each subsystem constituting a system has been developed from different vendors, the …
You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …
commands that modify their physical behaviors. We present a “selective checking” …
Attacking schedule indistinguishability in real-time systems
D Sanyal - 2022 - ideals.illinois.edu
Abstract Real-Time Systems (RTS) have gained prominence in new domains such as
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …
Security-Driven Design of Real-Time Embedded Systems
K Jiang - 2015 - diva-portal.org
R eal-time embedded systems (RTESs) have been widely used in modern society. And it is
also very common to find them in safety and security critical applications, such as …
also very common to find them in safety and security critical applications, such as …