Characterizing G-EDF scheduling tardiness with uniform instances on multiprocessors

G Buzzega, G Nocetti, M Montangero - Proceedings of the 31st …, 2023 - dl.acm.org
Soft real-time multiprocessor systems frequently adopt the G-EDF (Global-Earliest Deadline
First) scheduling policy as it is lightweight and it guarantees bounded tardiness. Much effort …

Work in progress: Exploring schedule-based side-channels in trustzone-enabled real-time systems

MA Aguida, M Hasan - 2022 IEEE 28th Real-Time and …, 2022 - ieeexplore.ieee.org
Our research demonstrates the existence of side-channel information leaks in TrustZone-
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …

Integration methods for host intrusion detection into embedded mixed-criticality systems

M Kadar - 2022 - kluedo.ub.rptu.de
With the growing support for features such as hardware virtualization tied to the boost of
hardware capacity, embedded systems are now able to regroup many software components …

Scheduler side-channels in preemptive real-time systems: Attack and defense techniques

CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …

Efficient system auditing for real-time systems

A Kandikuppa - 2021 - ideals.illinois.edu
Auditing is a powerful tool that provides machine operators with the mechanisms to observe,
and glean insights from, generic computing systems. The information obtained by auditing …

Overcoming the Performance and Security Challenges of Building Highly-Distributed Fault-Tolerant Embedded Systems

A Loveless - 2023 - deepblue.lib.umich.edu
Over the past few decades, embedded systems, like those in spacecraft and aircraft, have
evolved into complex distributed systems with hundreds of nodes and dozens of network …

Security enhancement in embedded hard real-time systems

N Bellec - 2023 - inria.hal.science
Real-time systems have more and more ways to communicate wirelessly with external
users. These same means can be hijacked to attack these systems, breaking their …

Attacking schedule indistinguishability in real-time systems

D Sanyal - 2022 - ideals.illinois.edu
Abstract Real-Time Systems (RTS) have gained prominence in new domains such as
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …

Schedule randomization based countermeasures against timing attacks in real-time wireless networks

A Samaddar - 2021 - dr.ntu.edu.sg
Cyber-physical systems are realized as those systems where the computation,
communication and physical processes interact with each other (eg, robotic systems …

Integrating security into real-time cyber-physical systems

M Hasan - 2020 - ideals.illinois.edu
Cyber-physical systems (CPS) such as automobiles, power plants, avionics systems,
unmanned vehicles, medical devices, manufacturing and home automation systems have …