Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Guaranteed physical security with restart-based design for cyber-physical systems

F Abdi, CY Chen, M Hasan, S Liu… - 2018 ACM/IEEE 9th …, 2018 - ieeexplore.ieee.org
Physical plants that form the core of the Cyber-Physical Systems (CPS) often have stringent
safety requirements. Recent attacks have shown that cyber intrusions can result in the safety …

Preserving physical safety under cyber attacks

F Abdi, CY Chen, M Hasan, S Liu… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Physical plants that form the core of the cyber-physical systems (CPSs) often have stringent
safety requirements and, recent attacks have shown that cyber intrusions can cause damage …

Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Protecting actuators in safety-critical IoT systems from control spoofing attacks

M Hasan, S Mohan - Proceedings of the 2nd International ACM …, 2019 - dl.acm.org
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …

Reboot-oriented IoT: Life cycle management in trusted execution environment for disposable IoT devices

K Suzaki, A Tsukamoto, A Green… - Proceedings of the 36th …, 2020 - dl.acm.org
Many IoT devices are geographically distributed without human administrators, which are
maintained by a remote server to enforce security updates, ideally through machine-to …

A design-space exploration for allocating security tasks in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … Design, Automation & …, 2018 - ieeexplore.ieee.org
The increased capabilities of modern real-time systems (RTS) expose them to various
security threats. Recently, frameworks that integrate security tasks without perturbing the real …

A simplex architecture for intelligent and safe unmanned aerial vehicles

P Vivekanandan, G Garcia, H Yun… - 2016 IEEE 22nd …, 2016 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research
purposes. However, they also possess serious threats to the society because faults in UAVs …

A short review of security-aware techniques in real-time embedded systems

H Chai, G Zhang, J Zhou, J Sun, L Huang… - Journal of Circuits …, 2019 - World Scientific
With the rapid development of embedded systems, users and services have been greatly
facilitated while also experiencing security threats as a result of cyber-attacks and system …