SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
[HTML][HTML] Securing real-time internet-of-things
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure.
Despite this, techniques for securing embedded systems software have not been widely …
Despite this, techniques for securing embedded systems software have not been widely …
Security-aware scheduling of embedded control tasks
In this work, we focus on securing cyber-physical systems (CPS) in the presence of network-
based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to …
based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to …
Protecting actuators in safety-critical IoT systems from control spoofing attacks
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …
edge devices with timing requirements from control spoofing attacks where an adversary …
Security-driven codesign with weakly-hard constraints for real-time embedded systems
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …
Secure planning against stealthy attacks via model-free reinforcement learning
We consider the problem of security-aware planning in an unknown stochastic environment,
in the presence of attacks on control signals (ie, actuators) of the robot. We model the …
in the presence of attacks on control signals (ie, actuators) of the robot. We model the …
Integrating security in resource-constrained cyber-physical systems
Defense mechanisms against network-level attacks are commonly based on the use of
cryptographic techniques, such as lengthy message authentication codes (MAC) that …
cryptographic techniques, such as lengthy message authentication codes (MAC) that …
[PDF][PDF] Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation
With the proliferation of safety-critical real-time systems in our daily life, it is imperative that
their security is protected to guarantee their functionalities. To this end, one of the most …
their security is protected to guarantee their functionalities. To this end, one of the most …
Network scheduling for secure cyber-physical systems
Existing design techniques for providing security guarantees against network-based attacks
in cyber-physical systems (CPS) are based on continuous use of standard cryptographic …
in cyber-physical systems (CPS) are based on continuous use of standard cryptographic …