SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
[HTML][HTML] Securing real-time internet-of-things
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
Survey of control-flow integrity techniques for real-time embedded systems
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …
connected to allow for more advanced and safer operation. Such embedded systems are …
Protecting actuators in safety-critical IoT systems from control spoofing attacks
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …
edge devices with timing requirements from control spoofing attacks where an adversary …
Security-driven codesign with weakly-hard constraints for real-time embedded systems
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
A systematic review on security aware real-time task scheduling
S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …
time application due to the rapidly enhanced use of such applications. This study presents a …
Safety-aware integration of hardware-assisted program tracing in mixed-criticality systems for security monitoring
M Kadar, G Fohler, D Kuzhiyelil… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
In Mixed-Criticality Systems (MCS), low-critical applications have a larger attack surface
compared to high-critical applications. Even though MCS isolate criticality domains of …
compared to high-critical applications. Even though MCS isolate criticality domains of …
Towards an increased detection sensitivity of time-delay attacks on precision time protocol
L Schönberger, M Hamad, JV Gomez… - IEEE …, 2021 - ieeexplore.ieee.org
Precision time protocol (PTP) is one of the most widely used protocols for clock
synchronization in packet-switched networks, on which, among others, the transaction …
synchronization in packet-switched networks, on which, among others, the transaction …
Beyond just safety: Delay-aware security monitoring for real-time control systems
Modern embedded real-time systems (RTS) are increasingly facing more security threats
than the past. A simplistic straightforward integration of security mechanisms might not be …
than the past. A simplistic straightforward integration of security mechanisms might not be …
Period adaptation for continuous security monitoring in multicore real-time systems
We propose HYDRA-C, a design-time evaluation framework for integrating monitoring
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …