Security-driven codesign with weakly-hard constraints for real-time embedded systems
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
Safety-aware flexible schedule synthesis for cyber-physical systems using weakly-hard constraints
With the emergence of complex autonomous systems, multiple control tasks are increasingly
being implemented on shared computational platforms. Due to the resource-constrained …
being implemented on shared computational platforms. Due to the resource-constrained …
Contego: An adaptive framework for integrating security tasks in real-time systems
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …
unknown security flaws, and threats to RTS are growing in both number and sophistication …
A systematic security analysis of real-time cyber-physical systems
A Easwaran, A Chattopadhyay… - 2017 22nd Asia and …, 2017 - ieeexplore.ieee.org
Security in Cyber-Physical Systems (CPS) has become a serious concern owing to the rapid
adoption of technologies such as plug-and-play connectivity, robotics and remote …
adoption of technologies such as plug-and-play connectivity, robotics and remote …
Towards security and qos optimization in real-time embedded systems
A number of real-time embedded systems (RTESs) are used to manage critical infrastructure
such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for …
such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for …
A design-space exploration for allocating security tasks in multicore real-time systems
The increased capabilities of modern real-time systems (RTS) expose them to various
security threats. Recently, frameworks that integrate security tasks without perturbing the real …
security threats. Recently, frameworks that integrate security tasks without perturbing the real …
Security-cognizant real-time scheduling
S Baruah - 2022 IEEE 25th International Symposium On Real …, 2022 - ieeexplore.ieee.org
The often very limited computational capacity available upon resource-constrained safety-
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …
Emergent design challenges for embedded systems and paths forward: mixed-criticality, energy, reliability and security perspectives
Modern embedded systems need to cater for several needs depending upon the application
domain in which they are deployed. For example, mixed-critically needs to be considered for …
domain in which they are deployed. For example, mixed-critically needs to be considered for …
Toward practical weakly hard real-time systems: A job-class-level scheduling approach
Recent applications of the Internet of Things and cyber-physical systems require the
integration of many sensing and control tasks into resource-constrained embedded devices …
integration of many sensing and control tasks into resource-constrained embedded devices …
Security as a new dimension in embedded system design
P Kocher, R Lee, G McGraw… - Proceedings of the 41st …, 2004 - dl.acm.org
The growing number of instances of breaches in information security in the last few years
has created a compelling case for efforts towards secure electronic systems. Embedded …
has created a compelling case for efforts towards secure electronic systems. Embedded …