Design optimization of confidentiality-critical cyber physical systems with fault detection

W Jiang, L Wen, J Zhan, K Jiang - Journal of Systems Architecture, 2020 - Elsevier
Since fault injection attack can be utilized to corrupt the data or deduce the secret key of
sensitive information, we approach the fault detection design of confidential real-time …

Design optimization for security-and safety-critical distributed real-time applications

W Jiang, P Pop, K Jiang - Microprocessors and Microsystems, 2017 - Elsevier
In this paper, we are interested in the design of real-time applications with security, safety,
timing, and energy requirements. The applications are scheduled with cyclic scheduling …

Reliability and confidentiality co-verification for parallel applications in distributed systems

G Xie, K Yang, H Luo, R Li, S Hu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Co-verification of reliability and confidentiality is a necessary process for safety-and security-
critical applications. While these two objectives are conflicting, preassignment has emerged …

Security-aware routing and scheduling for control applications on Ethernet TSN networks

R Mahfouzi, A Aminifar, S Samii, P Eles… - ACM Transactions on …, 2019 - dl.acm.org
Today, it is common knowledge in the cyber-physical systems domain that the tight
interaction between the cyber and physical elements provides the possibility of substantially …

Co-design techniques for distributed real-time embedded systems with communication security constraints

K Jiang, P Eles, Z Peng - 2012 Design, Automation & Test in …, 2012 - ieeexplore.ieee.org
In this paper we consider distributed real-time embedded systems in which confidentiality of
the internal communication is critical. We present an approach to efficiently implement …

Energy optimization of security-critical real-time applications with guaranteed security protection

W Jiang, K Jiang, X Zhang, Y Ma - Journal of systems architecture, 2015 - Elsevier
Designing energy-efficient applications has become of critical importance for embedded
systems, especially for battery-powered systems. Additionally, the emerging requirements …

Desco: Decomposition-based co-design to improve fault tolerance of security-critical tasks in cyber physical systems

W Jiang, X Liao, J Zhan, D Adhikari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Confidentiality-Specific Faults (CSFs) will put cyber physical systems in threat, since they
can result in corrupted information or even retrieve the cryptographic key of security-critical …

Optimization of message encryption for real-time applications in embedded systems

A Aminifar, P Eles, Z Peng - IEEE Transactions on Computers, 2017 - ieeexplore.ieee.org
Today, security can no longer be treated as a secondary issue in embedded and cyber-
physical systems. Therefore, one of the main challenges in these domains is the design of …

[PDF][PDF] Design optimization of security-sensitive mixed-criticality real-time embedded systems

X Zhang, J Zhan, W Jiang, Y Ma, K Jiang - 1st workshop on Real-Time …, 2013 - ida.liu.se
In this paper we are interested in securitysensitive mixed-criticality real-time systems.
Existing researches on mixed-criticality systems usually are safety-oriented, which seriously …

A systematic security analysis of real-time cyber-physical systems

A Easwaran, A Chattopadhyay… - 2017 22nd Asia and …, 2017 - ieeexplore.ieee.org
Security in Cyber-Physical Systems (CPS) has become a serious concern owing to the rapid
adoption of technologies such as plug-and-play connectivity, robotics and remote …