Cross-layer design for secure and resilient cyber-physical systems

Q Zhu, Z Xu - Cham, Switzerland: Springer, 2020 - Springer
This book presents control and game-theoretic tools to design secure and resilient cyber-
physical systems, including cloud-enabled control systems, 3D printers, robotic systems, and …

Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices

K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …

Software fault tolerance for cyber-physical systems via full system restart

P Jagtap, F Abdi, M Rungger, M Zamani… - ACM Transactions on …, 2020 - dl.acm.org
The article addresses the issue of reliability of complex embedded control systems in the
safety-critical environment. In this article, we propose a novel approach to design controller …

Software rejuvenation under persistent attacks in constrained environments

R Romagnoli, P Griffioen, BH Krogh, B Sinopoli - IFAC-PapersOnLine, 2020 - Elsevier
Software rejuvenation has been proposed to guarantee safety of cyber-physical systems
(CPSs) against cyber-attacks. Recent work has demonstrated how this method can be …

Secure networked control for decentralized systems via software rejuvenation

P Griffioen, R Romagnoli, BH Krogh… - 2020 American …, 2020 - ieeexplore.ieee.org
Decentralized control systems exist in many scenarios where agents have the ability to fully
communicate with one another but do not do so for multiple reasons, including cost and the …

Period adaptation for continuous security monitoring in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … Design, Automation & …, 2020 - ieeexplore.ieee.org
We propose HYDRA-C, a design-time evaluation framework for integrating monitoring
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …

Robust software rejuvenation for CPS with state estimation and disturbances

R Romagnoli, BH Krogh… - 2020 American Control …, 2020 - ieeexplore.ieee.org
Software rejuvenation has been proposed and demonstrated as a strategy to protect cyber-
physical systems (CSPs) against unanticipated and undetectable cyber attacks, but the …

[PDF][PDF] Information security analysis on physical security in university x using maturity model

KN Isnaini, SA Solikhatin - Jurnal Informatika, 2020 - pdfs.semanticscholar.org
The threat of physical security can be from human factors, natural disasters, and information
technology itself. Therefore, to prevent threats, we need the right tools to control current …

On scheduler side-channels in dynamic-priority real-time systems

CY Chen, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2020 - arxiv.org
While the existence of scheduler side-channels has been demonstrated recently for fixed-
priority real-time systems (RTS), there have been no similar explorations for dynamic-priority …