Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems
Memory corruption attacks such as code injection, code reuse, and non-control data attacks
have become widely popular for compromising safety-critical Cyber–Physical Systems …
have become widely popular for compromising safety-critical Cyber–Physical Systems …
Security-cognizant real-time scheduling
S Baruah - 2022 IEEE 25th International Symposium On Real …, 2022 - ieeexplore.ieee.org
The often very limited computational capacity available upon resource-constrained safety-
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …
A scheduling model inspired by security considerations
Safety-critical embedded systems such as autonomous vehicles typically have only very
limited computational capabilities on board that must be carefully managed to provide …
limited computational capabilities on board that must be carefully managed to provide …