Survey of control-flow integrity techniques for real-time embedded systems
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …
connected to allow for more advanced and safer operation. Such embedded systems are …
Vulnerability of controller area network to schedule-based attacks
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …
other roadway users. One of the critical functions for safety is the controller area network …
Pcspoof: Compromising the safety of time-triggered ethernet
Designers are increasingly using mixed-criticality networks in embedded systems to reduce
size, weight, power, and cost. Perhaps the most successful of these technologies is Time …
size, weight, power, and cost. Perhaps the most successful of these technologies is Time …
Security and reliability of safety-critical rtos
R Luna, SA Islam - SN Computer Science, 2021 - Springer
Abstract Real-Time Operating System (RTOS) presents a computing environment with the
ability to react to events within a strictly-defined period. Modern domain-specific (eg …
ability to react to events within a strictly-defined period. Modern domain-specific (eg …
Security-cognizant real-time scheduling
S Baruah - 2022 IEEE 25th International Symposium On Real …, 2022 - ieeexplore.ieee.org
The often very limited computational capacity available upon resource-constrained safety-
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …
Indistinguishability prevents scheduler side channels in real-time systems
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …
serious threats to many safety-critical applications. The main culprit is the inherent …
Task parameters analysis in schedule-based timing side-channel attack
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …
A scheduling model inspired by security considerations
Safety-critical embedded systems such as autonomous vehicles typically have only very
limited computational capabilities on board that must be carefully managed to provide …
limited computational capabilities on board that must be carefully managed to provide …
Slite: OS support for near zero-cost, configurable scheduling
PK Gadepalli, R Pan, G Parmer - 2020 IEEE Real-Time and …, 2020 - ieeexplore.ieee.org
Despite over 35 years of wildly changing requirements and applications, real-time systems
have treated the kernel implementation of system scheduling policy as given. New time …
have treated the kernel implementation of system scheduling policy as given. New time …
Safety-aware integration of hardware-assisted program tracing in mixed-criticality systems for security monitoring
M Kadar, G Fohler, D Kuzhiyelil… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
In Mixed-Criticality Systems (MCS), low-critical applications have a larger attack surface
compared to high-critical applications. Even though MCS isolate criticality domains of …
compared to high-critical applications. Even though MCS isolate criticality domains of …