Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …
S Berchtold, B Ertl, DA Keim… - … Conference on Data …, 1998 - ieeexplore.ieee.org
Similarity search in multimedia databases requires an efficient support of nearest neighbor search on a large set of high dimensional points as a basic operation for query processing …
RJ Walls, NF Brown, T Le Baron… - … Conference on Real …, 2019 - drops.dagstuhl.de
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, techniques for securing embedded systems software have not been widely …
Increasing the capacity of the Last Level Cache (LLC) can help scale the memory wall. Due to prohibitive area and leakage power, however, growing conventional SRAM LLC already …
The high degree of predictability in real-time systems makes it possible for adversaries to launch timing inference attacks such as those based on side-channels and covert-channels …
Timing-based side-channels play an important role in exposing the state of a process execution on underlying hardware by revealing information about timing and access …
Schedule randomization is one of the recently introduced security defenses against schedule-based attacks, ie, attacks whose success depends on a particular ordering …
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority real-time systems (RTS); examples of such systems can be found in automotive systems …
M Hasan, S Mohan - Proceedings of the 2nd International ACM …, 2019 - dl.acm.org
In this paper, we propose a framework called Contego-TEE to secure Internet-of-Things (IoT) edge devices with timing requirements from control spoofing attacks where an adversary …