Maximizing the security level of real-time software while preserving temporal constraints
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …
(IoT) and edge computing domains, where they are often employed as the control entity of a …
Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …
with external environments, the real-time systems are facing more and more security …
CHASE: A configurable hardware-assisted security extension for real-time systems
G Dessouky, S Zeitouni, A Ibrahim… - 2019 IEEE/ACM …, 2019 - ieeexplore.ieee.org
Real-time autonomous systems are becoming pervasive in many application domains such
as vehicular ad-hoc networks, smart factories and delivery drones. The correct functioning of …
as vehicular ad-hoc networks, smart factories and delivery drones. The correct functioning of …
Contego: An adaptive framework for integrating security tasks in real-time systems
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …
unknown security flaws, and threats to RTS are growing in both number and sophistication …
Securing time in untrusted operating systems with timeseal
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …
Security-driven codesign with weakly-hard constraints for real-time embedded systems
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
Towards security and qos optimization in real-time embedded systems
A number of real-time embedded systems (RTESs) are used to manage critical infrastructure
such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for …
such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for …
Improving security for periodic tasks in embedded systems through scheduling
While many scheduling algorithms for periodic tasks ignore security requirements posed by
sensitive applications and are, consequently, unable to perform properly in embedded …
sensitive applications and are, consequently, unable to perform properly in embedded …
A short review of security-aware techniques in real-time embedded systems
With the rapid development of embedded systems, users and services have been greatly
facilitated while also experiencing security threats as a result of cyber-attacks and system …
facilitated while also experiencing security threats as a result of cyber-attacks and system …
Work-in-progress: Measuring security protection in real-time embedded firmware
Y Wu, Y Wang, S Zhai, Z Li, A Li… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
The proliferation of real-time cyber-physical systems (CPS) is making profound changes to
our daily life. Many real-time CPSs are security and safety-critical because of their …
our daily life. Many real-time CPSs are security and safety-critical because of their …