Security enhancement in embedded hard real-time systems

N Bellec - 2023 - inria.hal.science
Real-time systems have more and more ways to communicate wirelessly with external
users. These same means can be hijacked to attack these systems, breaking their …

CHASE: A configurable hardware-assisted security extension for real-time systems

G Dessouky, S Zeitouni, A Ibrahim… - 2019 IEEE/ACM …, 2019 - ieeexplore.ieee.org
Real-time autonomous systems are becoming pervasive in many application domains such
as vehicular ad-hoc networks, smart factories and delivery drones. The correct functioning of …

TyTAN: Tiny trust anchor for tiny devices

F Brasser, B El Mahjoub, AR Sadeghi… - Proceedings of the …, 2015 - dl.acm.org
Embedded systems are at the core of many security-sensitive and safety-critical
applications, including automotive, industrial control systems, and critical infrastructures …

[PDF][PDF] Eliminating timing side-channels. a tutorial

P Schwabe - URL: https://cryptojedi. org/peter/data/shmoocon …, 2015 - cryptojedi.org
◮ Some need to run attack code in parallel to the target software◮ Attacker can log in
remotely (ssh)◮ Some attacks work by measuring network delays◮ Attacker does not even …

Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

Towards a formally verified hardware root-of-trust for data-oblivious computing

L Deutschmann, J Müller, MR Fadiheh… - Proceedings of the 59th …, 2022 - dl.acm.org
The importance of preventing microarchitectural timing side channels in security-critical
applications has surged immensely over the last several years. Constant-time programming …

Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

Mind the gap: Studying the insecurity of provably secure embedded trusted execution architectures

M Bognar, J Van Bulck… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The security claims of a system can be supported or refuted by different kinds of evidence.
On the one hand, attack research uses empirical, experimental, inductive methods to refute …

Lark: Verified Cross-Domain Access Control for Trusted Execution Environments

F Zeng, Z Zhang, R Chang, C Yu… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Trusted Execution Environments (TEEs) play a crucial role in embedded systems, IoT, and
cloud computing. However, their security issues are a major concern, particularly related to …

Period adaptation for continuous security monitoring in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … Design, Automation & …, 2020 - ieeexplore.ieee.org
We propose HYDRA-C, a design-time evaluation framework for integrating monitoring
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …