Secure and timely gpu execution in cyber-physical systems
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …
(CPSs), frequently used to perform real-time safety-critical functions, such as object …
[PDF][PDF] Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …
[PDF][PDF] Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation
With the proliferation of safety-critical real-time systems in our daily life, it is imperative that
their security is protected to guarantee their functionalities. To this end, one of the most …
their security is protected to guarantee their functionalities. To this end, one of the most …
Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
embedded and Internetof-Things devices. Despite the widespread usage, there has been …
Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust
X Zhang, K Qin, S Qu, T Wang, C Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …
InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring
D Fang, A Peng, E van der Kouwe… - … on Dependable and …, 2024 - ieeexplore.ieee.org
This paper considers a strongly connected network of agents, each capable of partially
observing and controlling a discrete-time linear time-invariant (LTI) system that is jointly …
observing and controlling a discrete-time linear time-invariant (LTI) system that is jointly …
Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution
N Rattanavipanon, IO Nunes - arXiv preprint arXiv:2404.06721, 2024 - arxiv.org
The rise in IoT-driven distributed data analytics, coupled with increasing privacy concerns,
has led to a demand for effective privacy-preserving and federated data collection/model …
has led to a demand for effective privacy-preserving and federated data collection/model …
InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …