Improving security for periodic tasks in embedded systems through scheduling

T Xie, X Qin - ACM Transactions on Embedded Computing Systems …, 2007 - dl.acm.org
While many scheduling algorithms for periodic tasks ignore security requirements posed by
sensitive applications and are, consequently, unable to perform properly in embedded …

Scheduling security-critical real-time applications on clusters

T Xie, X Qin - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
Security-critical real-time applications such as military aircraft flight control systems have
mandatory security requirements in addition to stringent timing constraints. Conventional …

Integrating security constraints into fixed priority real-time schedulers

S Mohan, MK Yoon, R Pellizzoni, RB Bobba - Real-Time Systems, 2016 - Springer
Traditionally, most real-time systems (RTS) were considered to be invulnerable to security
breaches and external attacks. This was mainly due to the use of proprietary hardware and …

Static security optimization for real-time systems

M Lin, L Xu, LT Yang, X Qin, N Zheng… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
An increasing number of real-time applications like railway signaling control systems and
medical electronics systems require high quality of security to assure confidentiality and …

Security-aware scheduling of embedded control tasks

V Lesi, I Jovanov, M Pajic - ACM Transactions on Embedded Computing …, 2017 - dl.acm.org
In this work, we focus on securing cyber-physical systems (CPS) in the presence of network-
based attacks, such as Man-in-the-Middle (MitM) attacks, where a stealthy attacker is able to …

Enhancing security of real-time applications on grids through dynamic scheduling

T Xie, X Qin - Workshop on Job Scheduling Strategies for Parallel …, 2005 - Springer
Real-time applications with security requirements are emerging in various areas including
government, education, and business. However, conventional real-time scheduling …

Dynamic task scheduling with security awareness in real-time systems

T Xie, A Sung, X Qin - 19th IEEE International Parallel and …, 2005 - ieeexplore.ieee.org
An increasing number of real-time applications, such as aircraft control and medical
electronics systems, require high quality of security to assure confidentiality, authenticity and …

Design optimization for security-and safety-critical distributed real-time applications

W Jiang, P Pop, K Jiang - Microprocessors and Microsystems, 2017 - Elsevier
In this paper, we are interested in the design of real-time applications with security, safety,
timing, and energy requirements. The applications are scheduled with cyclic scheduling …

A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters

X Zhu, P Lu - Computers & Electrical Engineering, 2009 - Elsevier
Nowadays, increasing attention has been directed towards the issue of security service for
real-time applications with security requirements on clusters. However, the study of …

Contego: An adaptive framework for integrating security tasks in real-time systems

M Hasan, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2017 - arxiv.org
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …