SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Machine learning in real-time Internet of Things (IoT) systems: A survey

J Bian, A Al Arafat, H Xiong, J Li, L Li… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Over the last decade, machine learning (ML) and deep learning (DL) algorithms have
significantly evolved and been employed in diverse applications, such as computer vision …

Fast nearest neighbor search in high-dimensional space

S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor
search on a large set of high dimensional points as a basic operation for query processing …

Control-flow integrity for real-time embedded systems

RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure.
Despite this, techniques for securing embedded systems software have not been widely …

Guaranteed physical security with restart-based design for cyber-physical systems

F Abdi, CY Chen, M Hasan, S Liu… - 2018 ACM/IEEE 9th …, 2018 - ieeexplore.ieee.org
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …

Moving target defense for the security and resilience of mixed time and event triggered cyber–physical systems

B Potteiger, A Dubey, F Cai, X Koutsoukos… - Journal of Systems …, 2022 - Elsevier
Memory corruption attacks such as code injection, code reuse, and non-control data attacks
have become widely popular for compromising safety-critical Cyber–Physical Systems …

Survey of control-flow integrity techniques for real-time embedded systems

T Mishra, T Chantem, R Gerdes - ACM Transactions on Embedded …, 2022 - dl.acm.org
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …

On the pitfalls and vulnerabilities of schedule randomization against schedule-based attacks

M Nasri, T Chantem, G Bloom… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
Schedule randomization is one of the recently introduced security defenses against
schedule-based attacks, ie, attacks whose success depends on a particular ordering …

Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems

K Krüger, M Volp, G Fohler - Leibniz International Proceedings in …, 2018 - orbilu.uni.lu
Much effort has been put into improving the predictability of real-time systems, especially in
safety-critical environments, which provides designers with a rich set of methods and tools to …