SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Securing real-time internet-of-things
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
INDRA: Intrusion detection using recurrent autoencoders in automotive embedded systems
Today's vehicles are complex distributed embedded systems that are increasingly being
connected to various external systems. Unfortunately, this increased connectivity makes the …
connected to various external systems. Unfortunately, this increased connectivity makes the …
Latte: L stm self-att ention based anomaly detection in e mbedded automotive platforms
Modern vehicles can be thought of as complex distributed embedded systems that run a
variety of automotive applications with real-time constraints. Recent advances in the …
variety of automotive applications with real-time constraints. Recent advances in the …
Lightweight collaborative anomaly detection for the IoT using blockchain
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …
Realswatt: Remote software-based attestation for embedded devices under realtime constraints
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …
Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …
launch timing inference attacks such as those based on side-channels and covert-channels …
Learning execution contexts from system call distribution for anomaly detection in smart embedded system
Existing techniques used for anomaly detection do not fully utilize the intrinsic properties of
embedded devices. In this paper, we propose a lightweight method for detecting anomalous …
embedded devices. In this paper, we propose a lightweight method for detecting anomalous …
Malicious firmware detection with hardware performance counters
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …
systems. It is often infeasible, however, to employ the same level of security measures used …
Leveraging side-channel information for disassembly and security
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …
devices, smart home appliances, as well as traditional computing platforms such as …