A systematic review on security aware real-time task scheduling

S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …

Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …

You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems

M Hasan, S Mohan - arXiv preprint arXiv:2304.13956, 2023 - arxiv.org
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …

A design space exploration approach to jointly optimize security and schedulability in TSP systems

IH Atchadam - 2023 - theses.hal.science
Modern real-time systems integrate more and more functions. Faced with this complexity,
isolation mechanisms are employed so that a failure occurring in one function cannot af fect …

[PDF][PDF] A Secure Resilient Real-Time Recovery Model, Scheduler, and Analysis

A Al Arafat, S Vaidhun, BC Ward, Z Guo - abdullahaarafat.github.io
Real-time and embedded systems are increasingly being applied in the command and
control of safety-and missioncritical applications such as autonomous vehicles and critical …