mainly due to their use of proprietary hardware and protocols, as well as physical isolation.
As a result, RTS and security have traditionally been separate domains. These assumptions
are being challenged by a series of recent events that highlight the vulnerabilities in RTS. In
this paper we focus on integrating security as a first class principle in the design of RTS: we
show that certain security requirements can be specified as real-time scheduling constraints …