A design-space exploration for allocating security tasks in multicore real-time systems
The increased capabilities of modern real-time systems (RTS) expose them to various
security threats. Recently, frameworks that integrate security tasks without perturbing the real …
security threats. Recently, frameworks that integrate security tasks without perturbing the real …
Period adaptation for continuous security monitoring in multicore real-time systems
We propose HYDRA-C, a design-time evaluation framework for integrating monitoring
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …
mechanisms in multicore real-time systems (RTS). Our goal is to ensure that security (or …
Exploring opportunistic execution for integrating security into legacy hard real-time systems
Due to physical isolation as well as use of proprietary hardware and protocols, traditional
real-time systems (RTS) were considered to be invulnerable to security breaches and …
real-time systems (RTS) were considered to be invulnerable to security breaches and …
Contego: An adaptive framework for integrating security tasks in real-time systems
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …
unknown security flaws, and threats to RTS are growing in both number and sophistication …
Real-time systems security through scheduler constraints
Real-time systems (RTS) were typically considered to be invulnerable to external attacks,
mainly due to their use of proprietary hardware and protocols, as well as physical isolation …
mainly due to their use of proprietary hardware and protocols, as well as physical isolation …
Improving security for time-triggered real-time systems with task replication
K Krüger, G Fohler, M Völp… - 2018 IEEE 24th …, 2018 - ieeexplore.ieee.org
Time-triggered real-time systems achieve deterministic behaviour, making them suitable for
safety-critical environments. However, this determinism also allows attackers to finetune …
safety-critical environments. However, this determinism also allows attackers to finetune …
A reconnaissance attack mechanism for fixed-priority real-time systems
In real-time embedded systems (RTS), failures due to security breaches can cause serious
damage to the system, the environment and/or injury to humans. Therefore, it is very …
damage to the system, the environment and/or injury to humans. Therefore, it is very …
Reorder: Securing dynamic-priority real-time systems using schedule obfuscation
The deterministic (timing) behavior of real-time systems (RTS) can be used by adversaries-
say, to launch side channel attacks or even destabilize the system by denying access to …
say, to launch side channel attacks or even destabilize the system by denying access to …
Phylax: Snapshot-based profiling of real-time embedded devices via jtag interface
C Konstantinou, E Chielle… - … Design, Automation & …, 2018 - ieeexplore.ieee.org
Real-time embedded systems play a significant role in the functionality of critical
infrastructure. Legacy microprocessor-based embedded systems, however, have not been …
infrastructure. Legacy microprocessor-based embedded systems, however, have not been …
Integrating security constraints into fixed priority real-time schedulers
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …
breaches and external attacks. This was mainly due to the use of proprietary hardware and …