SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

[HTML][HTML] Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Survey of control-flow integrity techniques for real-time embedded systems

T Mishra, T Chantem, R Gerdes - ACM Transactions on Embedded …, 2022 - dl.acm.org
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …

Protecting actuators in safety-critical IoT systems from control spoofing attacks

M Hasan, S Mohan - Proceedings of the 2nd International ACM …, 2019 - dl.acm.org
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …

Security-driven codesign with weakly-hard constraints for real-time embedded systems

H Liang, Z Wang, D Roy, S Dey… - 2019 IEEE 37th …, 2019 - ieeexplore.ieee.org
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …

A systematic review on security aware real-time task scheduling

S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …

Safety-aware integration of hardware-assisted program tracing in mixed-criticality systems for security monitoring

M Kadar, G Fohler, D Kuzhiyelil… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
In Mixed-Criticality Systems (MCS), low-critical applications have a larger attack surface
compared to high-critical applications. Even though MCS isolate criticality domains of …

Towards an increased detection sensitivity of time-delay attacks on precision time protocol

L Schönberger, M Hamad, JV Gomez… - IEEE …, 2021 - ieeexplore.ieee.org
Precision time protocol (PTP) is one of the most widely used protocols for clock
synchronization in packet-switched networks, on which, among others, the transaction …

Beyond just safety: Delay-aware security monitoring for real-time control systems

M Hasan, S Mohan, RB Bobba… - ACM Transactions on …, 2022 - dl.acm.org
Modern embedded real-time systems (RTS) are increasingly facing more security threats
than the past. A simplistic straightforward integration of security mechanisms might not be …

Period adaptation for continuous security monitoring in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … Design, Automation & …, 2020 - ieeexplore.ieee.org
We propose HYDRA-C, a design-time evaluation framework for integrating monitoring
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …