SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Integrating security constraints into fixed priority real-time schedulers
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
Real-time systems security through scheduler constraints
Real-time systems (RTS) were typically considered to be invulnerable to external attacks,
mainly due to their use of proprietary hardware and protocols, as well as physical isolation …
mainly due to their use of proprietary hardware and protocols, as well as physical isolation …
Exploring opportunistic execution for integrating security into legacy hard real-time systems
Due to physical isolation as well as use of proprietary hardware and protocols, traditional
real-time systems (RTS) were considered to be invulnerable to security breaches and …
real-time systems (RTS) were considered to be invulnerable to security breaches and …
Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems
K Krüger, M Volp, G Fohler - Leibniz International Proceedings in …, 2018 - orbilu.uni.lu
Much effort has been put into improving the predictability of real-time systems, especially in
safety-critical environments, which provides designers with a rich set of methods and tools to …
safety-critical environments, which provides designers with a rich set of methods and tools to …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
[PDF][PDF] Schedule-based side-channel attack in fixed-priority real-time systems
Security failures in real-time embedded systems can have catastrophic effects and can lead
to injury to (or even loss of life for) humans, damage to the system and also environmental …
to injury to (or even loss of life for) humans, damage to the system and also environmental …
A novel side-channel in real-time schedulers
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority
real-time systems (RTS); examples of such systems can be found in automotive systems …
real-time systems (RTS); examples of such systems can be found in automotive systems …
T-SYS: Timed-based system security for real-time kernels
B McDonald, F Mueller - 2022 ACM/IEEE 13th International …, 2022 - ieeexplore.ieee.org
The increasing proliferation of cyber-physical systems in a multitude of applications presents
a pressing need for effective methods of securing such devices. Many such systems are …
a pressing need for effective methods of securing such devices. Many such systems are …
Contego: An adaptive framework for integrating security tasks in real-time systems
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …
unknown security flaws, and threats to RTS are growing in both number and sophistication …