Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …

Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks

J Ren, C Liu, C Lin, R Bi, S Li, Z Wang, Y Qian… - ACM Transactions on …, 2023 - dl.acm.org
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …

CHASE: A configurable hardware-assisted security extension for real-time systems

G Dessouky, S Zeitouni, A Ibrahim… - 2019 IEEE/ACM …, 2019 - ieeexplore.ieee.org
Real-time autonomous systems are becoming pervasive in many application domains such
as vehicular ad-hoc networks, smart factories and delivery drones. The correct functioning of …

Contego: An adaptive framework for integrating security tasks in real-time systems

M Hasan, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2017 - arxiv.org
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …

Securing time in untrusted operating systems with timeseal

FM Anwar, L Garcia, X Han… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
An accurate sense of elapsed time is essential for the safe and correct operation of
hardware, software, and networked systems. Unfortunately, an adversary can manipulate …

Security-driven codesign with weakly-hard constraints for real-time embedded systems

H Liang, Z Wang, D Roy, S Dey… - 2019 IEEE 37th …, 2019 - ieeexplore.ieee.org
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …

Towards security and qos optimization in real-time embedded systems

KD Kang, SH Son - ACM SIGBED Review, 2006 - dl.acm.org
A number of real-time embedded systems (RTESs) are used to manage critical infrastructure
such as electric grids or C4I systems. In these systems, it is essential to meet deadlines, for …

Improving security for periodic tasks in embedded systems through scheduling

T Xie, X Qin - ACM Transactions on Embedded Computing Systems …, 2007 - dl.acm.org
While many scheduling algorithms for periodic tasks ignore security requirements posed by
sensitive applications and are, consequently, unable to perform properly in embedded …

A short review of security-aware techniques in real-time embedded systems

H Chai, G Zhang, J Zhou, J Sun, L Huang… - Journal of Circuits …, 2019 - World Scientific
With the rapid development of embedded systems, users and services have been greatly
facilitated while also experiencing security threats as a result of cyber-attacks and system …

Work-in-progress: Measuring security protection in real-time embedded firmware

Y Wu, Y Wang, S Zhai, Z Li, A Li… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
The proliferation of real-time cyber-physical systems (CPS) is making profound changes to
our daily life. Many real-time CPSs are security and safety-critical because of their …