SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

An intelligent iot sensing system for rail vehicle running states based on tinyml

S Zhou, Y Du, B Chen, Y Li, X Luan - IEEE Access, 2022 - ieeexplore.ieee.org
Real-time identification of the running state is one of the key technologies for a smart rail
vehicle. However, it is a challenge to accurately real-time sense the complex running states …

Indistinguishability prevents scheduler side channels in real-time systems

CY Chen, D Sanyal, S Mohan - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …

The thundering herd: Amplifying kernel interference to attack response times

S Mergendahl, S Jero, BC Ward… - 2022 IEEE 28th Real …, 2022 - ieeexplore.ieee.org
Embedded and real-time systems are increasingly attached to networks. This enables
broader coordination beyond the physical system, but also opens the system to attacks. The …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …

ITFDS: channel-aware integrated time and frequency-based downlink LTE scheduling in MANET

LM Tuan, LH Son, HV Long, LR Priya, KR Soundar… - Sensors, 2020 - mdpi.com
One of the crucial problems in Industry 4.0 is how to strengthen the performance of mobile
communication within mobile ad-hoc networks (MANETs) and mobile computational grids …

Minimizing side-channel attack vulnerability via schedule randomization

N Vreman, R Pates, K Krüger, G Fohler… - 2019 IEEE 58th …, 2019 - ieeexplore.ieee.org
Control systems can be vulnerable to security threats where an attacker gathers information
about the execution of the system. In particular, side-channel attacks exploit the predictability …

Reorder++: Enhanced randomized real-time scheduling strategy against side-channel attacks

J Ren, Z Wang, C Lin, MS Obaidat, H Xie… - … on Network Science …, 2023 - ieeexplore.ieee.org
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts,
automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …

You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems

M Hasan, S Mohan - arXiv preprint arXiv:2304.13956, 2023 - arxiv.org
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …