Characterizing G-EDF scheduling tardiness with uniform instances on multiprocessors
G Buzzega, G Nocetti, M Montangero - Proceedings of the 31st …, 2023 - dl.acm.org
Soft real-time multiprocessor systems frequently adopt the G-EDF (Global-Earliest Deadline
First) scheduling policy as it is lightweight and it guarantees bounded tardiness. Much effort …
First) scheduling policy as it is lightweight and it guarantees bounded tardiness. Much effort …
Work in progress: Exploring schedule-based side-channels in trustzone-enabled real-time systems
Our research demonstrates the existence of side-channel information leaks in TrustZone-
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …
enabled real-time systems. Our algorithm can infer the critical tasks' arrival times and …
Integration methods for host intrusion detection into embedded mixed-criticality systems
M Kadar - 2022 - kluedo.ub.rptu.de
With the growing support for features such as hardware virtualization tied to the boost of
hardware capacity, embedded systems are now able to regroup many software components …
hardware capacity, embedded systems are now able to regroup many software components …
Scheduler side-channels in preemptive real-time systems: Attack and defense techniques
CY Chen - 2020 - ideals.illinois.edu
This dissertation aims to address the problem of the side-channels caused by the
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
deterministic nature embedded in the real-time schedulers in preemptive real-time systems …
Efficient system auditing for real-time systems
A Kandikuppa - 2021 - ideals.illinois.edu
Auditing is a powerful tool that provides machine operators with the mechanisms to observe,
and glean insights from, generic computing systems. The information obtained by auditing …
and glean insights from, generic computing systems. The information obtained by auditing …
Overcoming the Performance and Security Challenges of Building Highly-Distributed Fault-Tolerant Embedded Systems
A Loveless - 2023 - deepblue.lib.umich.edu
Over the past few decades, embedded systems, like those in spacecraft and aircraft, have
evolved into complex distributed systems with hundreds of nodes and dozens of network …
evolved into complex distributed systems with hundreds of nodes and dozens of network …
Security enhancement in embedded hard real-time systems
N Bellec - 2023 - inria.hal.science
Real-time systems have more and more ways to communicate wirelessly with external
users. These same means can be hijacked to attack these systems, breaking their …
users. These same means can be hijacked to attack these systems, breaking their …
Attacking schedule indistinguishability in real-time systems
D Sanyal - 2022 - ideals.illinois.edu
Abstract Real-Time Systems (RTS) have gained prominence in new domains such as
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …
Schedule randomization based countermeasures against timing attacks in real-time wireless networks
A Samaddar - 2021 - dr.ntu.edu.sg
Cyber-physical systems are realized as those systems where the computation,
communication and physical processes interact with each other (eg, robotic systems …
communication and physical processes interact with each other (eg, robotic systems …
Integrating security into real-time cyber-physical systems
M Hasan - 2020 - ideals.illinois.edu
Cyber-physical systems (CPS) such as automobiles, power plants, avionics systems,
unmanned vehicles, medical devices, manufacturing and home automation systems have …
unmanned vehicles, medical devices, manufacturing and home automation systems have …