SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

[HTML][HTML] Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks

L Cheng, K Tian, D Yao - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
Recent studies have revealed that control programs running on embedded devices suffer
from both control-oriented attacks (eg, code-injection or code-reuse attacks) and data …

Security perspective analysis of industrial cyber physical systems (I-CPS): A decade-wide survey

N Agrawal, R Kumar - ISA transactions, 2022 - Elsevier
Considering the exceptional growth of Cyber Physical Systems (CPSs), multiple and
potentially grave security challenges have emerged in this field. Different vulnerabilities and …

Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids

AP Kuruvila, I Zografopoulos, K Basu… - International Journal of …, 2021 - Elsevier
The electric grid modernization effort relies on the extensive deployment of microgrid (MG)
systems. MGs integrate renewable resources and energy storage systems, allowing to …

On code execution tracking via power side-channel

Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu - Proceedings of the 2016 …, 2016 - dl.acm.org
With the proliferation of Internet of Things, there is a growing interest in embedded system
attacks, eg, key extraction attacks and firmware modification attacks. Code execution …

Ghost in the PLC: Designing an undetectable programmable logic controller rootkit via pin control attack

A Abbasi, M Hashemi - Black Hat Europe 2016, 2016 - research.utwente.nl
Input/Output is the mechanisms through which embedded systems interact and control the
outside world. Particularly when employed in mission critical systems, the I/O of embedded …

[图书][B] Anomaly detection as a service: challenges, advances, and opportunities

Anomaly detection has been a long-standing security approach with versatile applications,
ranging from securing server programs in critical environments, to detecting insider threats …

Malicious firmware detection with hardware performance counters

X Wang, C Konstantinou, M Maniatakos… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …

Survey of control-flow integrity techniques for real-time embedded systems

T Mishra, T Chantem, R Gerdes - ACM Transactions on Embedded …, 2022 - dl.acm.org
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …