Side-channel attack resilience through route randomisation in secure real-time networks-on-chip
LS Indrusiak, J Harbin… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Security can be seen as an optimization objective in NoC resource management, and as
such poses trade-offs against other objectives such as real-time schedulability. In this paper …
such poses trade-offs against other objectives such as real-time schedulability. In this paper …
Contego: An adaptive framework for integrating security tasks in real-time systems
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …
unknown security flaws, and threats to RTS are growing in both number and sophistication …
A systematic security analysis of real-time cyber-physical systems
A Easwaran, A Chattopadhyay… - 2017 22nd Asia and …, 2017 - ieeexplore.ieee.org
Security in Cyber-Physical Systems (CPS) has become a serious concern owing to the rapid
adoption of technologies such as plug-and-play connectivity, robotics and remote …
adoption of technologies such as plug-and-play connectivity, robotics and remote …
Improving security for time-triggered real-time systems against timing inference based attacks by schedule obfuscation
K Krüger, G Fohler, M Volp - Work-in-Progress Proceedings ECRTS'17, 2017 - orbilu.uni.lu
Covert timing channels in real-time systems allow adversaries to not only exfiltrate
application secrets but also to mount timing inference based attacks. Much effort has been …
application secrets but also to mount timing inference based attacks. Much effort has been …
Restart-based security mechanisms for safety-critical embedded systems
Many physical plants that are controlled by embedded systems have safety requirements
that need to be respected at all times-any deviations from expected behavior can result in …
that need to be respected at all times-any deviations from expected behavior can result in …
Information leakage as a scheduling resource
High-security processes have to load confidential information into shared resources as part
of their operation. This confidential information may be leaked (directly or indirectly) to low …
of their operation. This confidential information may be leaked (directly or indirectly) to low …
Secure and dependable cyber-physical system architectures
MK Yoon - 2017 - ideals.illinois.edu
The increased computational power and connectivity in modern Cyber-Physical Systems
(CPS) inevitably introduce more security vulnerabilities. The concern about CPS security is …
(CPS) inevitably introduce more security vulnerabilities. The concern about CPS security is …
[引用][C] 실행시간확률분포를고려한실시간시스템은닉타이밍채널
곽재헌, 이진규 - 한국정보과학회학술발표논문집, 2017 - dbpia.co.kr
요 약실시간 시스템 (real-time system) 에서는 모든 태스크 (Task) 가 데드라인 (deadline)
이전에 끝남을 보장해야 한다. 이를 위해 실시간 시스템에선 최악의 경우에도 태스크들이 …
이전에 끝남을 보장해야 한다. 이를 위해 실시간 시스템에선 최악의 경우에도 태스크들이 …