Survey of control-flow integrity techniques for real-time embedded systems

T Mishra, T Chantem, R Gerdes - ACM Transactions on Embedded …, 2022 - dl.acm.org
Computing systems, including real-time embedded systems, are becoming increasingly
connected to allow for more advanced and safer operation. Such embedded systems are …

Vulnerability of controller area network to schedule-based attacks

S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …

Pcspoof: Compromising the safety of time-triggered ethernet

A Loveless, LTX Phan, R Dreslinski… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Designers are increasingly using mixed-criticality networks in embedded systems to reduce
size, weight, power, and cost. Perhaps the most successful of these technologies is Time …

Security and reliability of safety-critical rtos

R Luna, SA Islam - SN Computer Science, 2021 - Springer
Abstract Real-Time Operating System (RTOS) presents a computing environment with the
ability to react to events within a strictly-defined period. Modern domain-specific (eg …

Security-cognizant real-time scheduling

S Baruah - 2022 IEEE 25th International Symposium On Real …, 2022 - ieeexplore.ieee.org
The often very limited computational capacity available upon resource-constrained safety-
critical embedded systems (such as unmanned aerial vehicles) must be carefully managed …

Indistinguishability prevents scheduler side channels in real-time systems

CY Chen, D Sanyal, S Mohan - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Scheduler side-channels can leak critical information in real-time systems, thus posing
serious threats to many safety-critical applications. The main culprit is the inherent …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …

A scheduling model inspired by security considerations

S Baruah, T Chantem, N Fisher… - 2023 IEEE 26th …, 2023 - ieeexplore.ieee.org
Safety-critical embedded systems such as autonomous vehicles typically have only very
limited computational capabilities on board that must be carefully managed to provide …

Slite: OS support for near zero-cost, configurable scheduling

PK Gadepalli, R Pan, G Parmer - 2020 IEEE Real-Time and …, 2020 - ieeexplore.ieee.org
Despite over 35 years of wildly changing requirements and applications, real-time systems
have treated the kernel implementation of system scheduling policy as given. New time …

Safety-aware integration of hardware-assisted program tracing in mixed-criticality systems for security monitoring

M Kadar, G Fohler, D Kuzhiyelil… - 2021 IEEE 27th Real …, 2021 - ieeexplore.ieee.org
In Mixed-Criticality Systems (MCS), low-critical applications have a larger attack surface
compared to high-critical applications. Even though MCS isolate criticality domains of …