Secure and timely gpu execution in cyber-physical systems

J Wang, Y Wang, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Graphics Processing Units (GPU) are increasingly deployed on Cyber-physical Systems
(CPSs), frequently used to perform real-time safety-critical functions, such as object …

[PDF][PDF] Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities

Y Wu, J Wang, Y Wang, S Zhai, Z Li, Y He… - USENIX Security …, 2023 - usenix.org
Embedded devices are increasingly ubiquitous in our society. Firmware updates are one of
the primary mechanisms to mitigate vulnerabilities in embedded systems. However, the …

[PDF][PDF] Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation

Y Wang, A Li, J Wang, S Baruah, N Zhang - Proceedings of the 33rd …, 2024 - usenix.org
With the proliferation of safety-critical real-time systems in our daily life, it is imperative that
their security is protected to guarantee their functionalities. To this end, one of the most …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

IP Protection in TinyML

J Wang, Y Wu, H Liu, B Yuan… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Tiny machine learning (TinyML) is an essential component of emerging smart
microcontrollers (MCUs). However, the protection of the intellectual property (IP) of the …

Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust

X Zhang, K Qin, S Qu, T Wang, C Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Remote Attestation (RA) enables the integrity and authenticity of applications in Trusted
Execution Environment (TEE) to be verified. Existing TEE RA designs employ a centralized …

InvisiGuard: Data Integrity for Microcontroller-Based Devices via Hardware-Triggered Write Monitoring

D Fang, A Peng, E van der Kouwe… - … on Dependable and …, 2024 - ieeexplore.ieee.org
This paper considers a strongly connected network of agents, each capable of partially
observing and controlling a discrete-time linear time-invariant (LTI) system that is jointly …

Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution

N Rattanavipanon, IO Nunes - arXiv preprint arXiv:2404.06721, 2024 - arxiv.org
The rise in IoT-driven distributed data analytics, coupled with increasing privacy concerns,
has led to a demand for effective privacy-preserving and federated data collection/model …

InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System

Y Wang, CL Mack, X Tan, N Zhang… - 2024 IEEE 30th Real …, 2024 - ieeexplore.ieee.org
Real-time and embedded systems are predominantly written in C, a language that is
notoriously not memory safe. This has led to widespread memory-corruption vulnerabilities …