Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …
Differentially Private Resource Allocation
Recent studies have shown that systems with limited resources like Metadata-private
Messenger (MPM) suffer from side-channel attacks under resource allocation (RA). In the …
Messenger (MPM) suffer from side-channel attacks under resource allocation (RA). In the …
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems
With the emergence of large foundational models, model-serving systems are becoming
popular. In such a system, users send the queries to the server and specify the desired …
popular. In such a system, users send the queries to the server and specify the desired …
CSCAD: An Adaptive LightGBM Algorithm to Detect Cache Side-Channel Attacks
S Hao, J He, W Li, T Li, G Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cache side-channel attacks have become more sophisticated and more destructive to the
security of computer architectures and cloud platforms than ever before, resulting in the …
security of computer architectures and cloud platforms than ever before, resulting in the …
Protection Window Based Security-Aware Scheduling against Schedule-Based Attacks
With widespread use of common-off-the-shelf components and the drive towards connection
with external environments, the real-time systems are facing more and more security …
with external environments, the real-time systems are facing more and more security …
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works
Cyber-physical systems (CPS) have experienced rapid growth in recent decades. However,
like any other computer-based systems, malicious attacks evolve mutually, driving CPS to …
like any other computer-based systems, malicious attacks evolve mutually, driving CPS to …
Attacking schedule indistinguishability in real-time systems
D Sanyal - 2022 - ideals.illinois.edu
Abstract Real-Time Systems (RTS) have gained prominence in new domains such as
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …
autonomous cars, drones, and the Internet-of-Things (IoT). RTS have stringent timing …