SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

[HTML][HTML] Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Control-flow integrity for real-time embedded systems

RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure.
Despite this, techniques for securing embedded systems software have not been widely …

Security-aware scheduling of embedded control tasks

V Lesi, I Jovanov, M Pajic - ACM Transactions on Embedded Computing …, 2017 - dl.acm.org
In this work, we focus on securing cyber-physical systems (CPS) in the presence of network-
based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to …

Protecting actuators in safety-critical IoT systems from control spoofing attacks

M Hasan, S Mohan - Proceedings of the 2nd International ACM …, 2019 - dl.acm.org
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT)
edge devices with timing requirements from control spoofing attacks where an adversary …

Security-driven codesign with weakly-hard constraints for real-time embedded systems

H Liang, Z Wang, D Roy, S Dey… - 2019 IEEE 37th …, 2019 - ieeexplore.ieee.org
For many embedded systems, such as automotive electronic systems, security has become
a pressing challenge. Limited resources and tight timing constraints often make it difficult to …

Secure planning against stealthy attacks via model-free reinforcement learning

AK Bozkurt, Y Wang, M Pajic - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
We consider the problem of security-aware planning in an unknown stochastic environment,
in the presence of attacks on control signals (ie, actuators) of the robot. We model the …

Integrating security in resource-constrained cyber-physical systems

V Lesi, I Jovanov, M Pajic - ACM Transactions on Cyber-Physical …, 2020 - dl.acm.org
Defense mechanisms against network-level attacks are commonly based on the use of
cryptographic techniques, such as lengthy message authentication codes (MAC) that …

[PDF][PDF] Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation

Y Wang, A Li, J Wang, S Baruah, N Zhang - Proceedings of the 33rd …, 2024 - usenix.org
With the proliferation of safety-critical real-time systems in our daily life, it is imperative that
their security is protected to guarantee their functionalities. To this end, one of the most …

Network scheduling for secure cyber-physical systems

V Lesi, I Jovanov, M Pajic - 2017 IEEE Real-Time Systems …, 2017 - ieeexplore.ieee.org
Existing design techniques for providing security guarantees against network-based attacks
in cyber-physical systems (CPS) are based on continuous use of standard cryptographic …