SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
An intelligent iot sensing system for rail vehicle running states based on tinyml
S Zhou, Y Du, B Chen, Y Li, X Luan - IEEE Access, 2022 - ieeexplore.ieee.org
Real-time identification of the running state is one of the key technologies for a smart rail
vehicle. However, it is a challenge to accurately real-time sense the complex running states …
vehicle. However, it is a challenge to accurately real-time sense the complex running states …
Indistinguishability prevents scheduler side channels in real-time systems
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …
serious threats to many safety-critical applications. The main culprit is the inherent …
The thundering herd: Amplifying kernel interference to attack response times
Embedded and real-time systems are increasingly attached to networks. This enables
broader coordination beyond the physical system, but also opens the system to attacks. The …
broader coordination beyond the physical system, but also opens the system to attacks. The …
Task parameters analysis in schedule-based timing side-channel attack
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …
ITFDS: channel-aware integrated time and frequency-based downlink LTE scheduling in MANET
One of the crucial problems in Industry 4.0 is how to strengthen the performance of mobile
communication within mobile ad-hoc networks (MANETs) and mobile computational grids …
communication within mobile ad-hoc networks (MANETs) and mobile computational grids …
Minimizing side-channel attack vulnerability via schedule randomization
Control systems can be vulnerable to security threats where an attacker gathers information
about the execution of the system. In particular, side-channel attacks exploit the predictability …
about the execution of the system. In particular, side-channel attacks exploit the predictability …
Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …
You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …
commands that modify their physical behaviors. We present a “selective checking” …
You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …
commands that modify their physical behaviors. The limited resources in such systems …