SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
[HTML][HTML] Securing real-time internet-of-things
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …
Security perspective analysis of industrial cyber physical systems (I-CPS): A decade-wide survey
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and
potentially grave security challenges have emerged in this field. Different vulnerabilities and …
potentially grave security challenges have emerged in this field. Different vulnerabilities and …
Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …
systems. MGs integrate renewable resources and energy storage systems, allowing to …
On code execution tracking via power side-channel
With the proliferation of Internet of Things, there is a growing interest in embedded system
attacks, eg, key extraction attacks and firmware modification attacks. Code execution …
attacks, eg, key extraction attacks and firmware modification attacks. Code execution …
Ghost in the PLC: Designing an undetectable programmable logic controller rootkit via pin control attack
A Abbasi, M Hashemi - Black Hat Europe 2016, 2016 - research.utwente.nl
Input/Output is the mechanisms through which embedded systems interact and control the
outside world. Particularly when employed in mission critical systems, the I/O of embedded …
outside world. Particularly when employed in mission critical systems, the I/O of embedded …
[图书][B] Anomaly detection as a service: challenges, advances, and opportunities
Anomaly detection has been a long-standing security approach with versatile applications,
ranging from securing server programs in critical environments, to detecting insider threats …
ranging from securing server programs in critical environments, to detecting insider threats …
Malicious firmware detection with hardware performance counters
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …
systems. It is often infeasible, however, to employ the same level of security measures used …
Survey of control-flow integrity techniques for real-time embedded systems
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …
connected to allow for more advanced and safer operation. Such embedded systems are …