Exploring opportunistic execution for integrating security into legacy hard real-time systems

M Hasan, S Mohan, RB Bobba… - 2016 IEEE Real-Time …, 2016 - ieeexplore.ieee.org
Due to physical isolation as well as use of proprietary hardware and protocols, traditional
real-time systems (RTS) were considered to be invulnerable to security breaches and …

Real-time systems security through scheduler constraints

S Mohan, MK Yoon, R Pellizzoni… - 2014 26th Euromicro …, 2014 - ieeexplore.ieee.org
Real-time systems (RTS) were typically considered to be invulnerable to external attacks,
mainly due to their use of proprietary hardware and protocols, as well as physical isolation …

Contego: An adaptive framework for integrating security tasks in real-time systems

M Hasan, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2017 - arxiv.org
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …

Integrating security constraints into fixed priority real-time schedulers

S Mohan, MK Yoon, R Pellizzoni, RB Bobba - Real-Time Systems, 2016 - Springer
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …

A generalized model for preventing information leakage in hard real-time systems

R Pellizzoni, N Paryab, MK Yoon, S Bak… - 21st IEEE Real-Time …, 2015 - ieeexplore.ieee.org
Traditionally real-time systems and security have been considered as separate domains.
Recent attacks on various systems with real-time properties have shown the need for a …

A design-space exploration for allocating security tasks in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … Design, Automation & …, 2018 - ieeexplore.ieee.org
The increased capabilities of modern real-time systems (RTS) expose them to various
security threats. Recently, frameworks that integrate security tasks without perturbing the real …

SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

A reconnaissance attack mechanism for fixed-priority real-time systems

CY Chen, AE Ghassami, S Mohan, N Kiyavash… - arXiv preprint arXiv …, 2017 - arxiv.org
In real-time embedded systems (RTS), failures due to security breaches can cause serious
damage to the system, the environment and/or injury to humans. Therefore, it is very …

Security-cognizant real-time scheduling

S Baruah - 2022 IEEE 25th International Symposium On Real …, 2022 - ieeexplore.ieee.org
The often very limited computational capacity available upon resource-constrained safety-
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …

Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems

K Krüger, M Volp, G Fohler - Leibniz International Proceedings in …, 2018 - orbilu.uni.lu
Much effort has been put into improving the predictability of real-time systems, especially in
safety-critical environments, which provides designers with a rich set of methods and tools to …