SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Fast nearest neighbor search in high-dimensional space
S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor
search on a large set of high dimensional points as a basic operation for query processing …
search on a large set of high dimensional points as a basic operation for query processing …
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure.
Despite this, techniques for securing embedded systems software have not been widely …
Despite this, techniques for securing embedded systems software have not been widely …
Density tradeoffs of non-volatile memory as a replacement for SRAM based last level cache
Increasing the capacity of the Last Level Cache (LLC) can help scale the memory wall. Due
to prohibitive area and leakage power, however, growing conventional SRAM LLC already …
to prohibitive area and leakage power, however, growing conventional SRAM LLC already …
Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …
launch timing inference attacks such as those based on side-channels and covert-channels …
Optimizing energy in non-preemptive mixed-criticality scheduling by exploiting probabilistic information
A Bhuiyan, F Reghenzani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The strict requirements on the timing correctness biased the modeling and analysis of real-
time systems toward the worst-case performances. Such focus on the worst-case, however …
time systems toward the worst-case performances. Such focus on the worst-case, however …
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …
execution on underlying hardware by revealing information about timing and access …
A generalized model for preventing information leakage in hard real-time systems
Traditionally real-time systems and security have been considered as separate domains.
Recent attacks on various systems with real-time properties have shown the need for a …
Recent attacks on various systems with real-time properties have shown the need for a …
On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …
schedule-based attacks, ie, attacks whose success depends on a particular ordering …