SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Fast nearest neighbor search in high-dimensional space

S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor
search on a large set of high dimensional points as a basic operation for query processing …

Control-flow integrity for real-time embedded systems

RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure.
Despite this, techniques for securing embedded systems software have not been widely …

Density tradeoffs of non-volatile memory as a replacement for SRAM based last level cache

K Korgaonkar, I Bhati, H Liu, J Gaur… - 2018 ACM/IEEE 45th …, 2018 - ieeexplore.ieee.org
Increasing the capacity of the Last Level Cache (LLC) can help scale the memory wall. Due
to prohibitive area and leakage power, however, growing conventional SRAM LLC already …

Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

Optimizing energy in non-preemptive mixed-criticality scheduling by exploiting probabilistic information

A Bhuiyan, F Reghenzani… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The strict requirements on the timing correctness biased the modeling and analysis of real-
time systems toward the worst-case performances. Such focus on the worst-case, however …

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti… - Information Systems, 2020 - Elsevier
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …

A generalized model for preventing information leakage in hard real-time systems

R Pellizzoni, N Paryab, MK Yoon, S Bak… - 21st IEEE Real-Time …, 2015 - ieeexplore.ieee.org
Traditionally real-time systems and security have been considered as separate domains.
Recent attacks on various systems with real-time properties have shown the need for a …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …