Security enhancement in embedded hard real-time systems
N Bellec - 2023 - inria.hal.science
Real-time systems have more and more ways to communicate wirelessly with external
users. These same means can be hijacked to attack these systems, breaking their …
users. These same means can be hijacked to attack these systems, breaking their …
CHASE: A configurable hardware-assisted security extension for real-time systems
G Dessouky, S Zeitouni, A Ibrahim… - 2019 IEEE/ACM …, 2019 - ieeexplore.ieee.org
Real-time autonomous systems are becoming pervasive in many application domains such
as vehicular ad-hoc networks, smart factories and delivery drones. The correct functioning of …
as vehicular ad-hoc networks, smart factories and delivery drones. The correct functioning of …
TyTAN: Tiny trust anchor for tiny devices
F Brasser, B El Mahjoub, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Embedded systems are at the core of many security-sensitive and safety-critical
applications, including automotive, industrial control systems, and critical infrastructures …
applications, including automotive, industrial control systems, and critical infrastructures …
[PDF][PDF] Eliminating timing side-channels. a tutorial
P Schwabe - URL: https://cryptojedi. org/peter/data/shmoocon …, 2015 - cryptojedi.org
◮ Some need to run attack code in parallel to the target software◮ Attacker can log in
remotely (ssh)◮ Some attacks work by measuring network delays◮ Attacker does not even …
remotely (ssh)◮ Some attacks work by measuring network delays◮ Attacker does not even …
Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …
separation. It has been quite successful in defending against various software attacks and …
Towards a formally verified hardware root-of-trust for data-oblivious computing
The importance of preventing microarchitectural timing side channels in security-critical
applications has surged immensely over the last several years. Constant-time programming …
applications has surged immensely over the last several years. Constant-time programming …
Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …
launch timing inference attacks such as those based on side-channels and covert-channels …
Mind the gap: Studying the insecurity of provably secure embedded trusted execution architectures
M Bognar, J Van Bulck… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The security claims of a system can be supported or refuted by different kinds of evidence.
On the one hand, attack research uses empirical, experimental, inductive methods to refute …
On the one hand, attack research uses empirical, experimental, inductive methods to refute …
Lark: Verified Cross-Domain Access Control for Trusted Execution Environments
F Zeng, Z Zhang, R Chang, C Yu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Trusted Execution Environments (TEEs) play a crucial role in embedded systems, IoT, and
cloud computing. However, their security issues are a major concern, particularly related to …
cloud computing. However, their security issues are a major concern, particularly related to …
Period adaptation for continuous security monitoring in multicore real-time systems
We propose HYDRA-C, a design-time evaluation framework for integrating monitoring
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …