SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

Rt-tee: Real-time system availability for cyber-physical systems using arm trustzone

J Wang, A Li, H Li, C Lu, N Zhang - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Embedded devices are becoming increasingly pervasive in safety-critical systems of the
emerging cyber-physical world. While trusted execution environments (TEEs), such as ARM …

{ARI}: Attestation of Real-time Mission Execution Integrity

J Wang, Y Wang, A Li, Y Xiao, R Zhang, W Lou… - 32nd USENIX Security …, 2023 - usenix.org
With the proliferation of autonomous safety-critical cyber-physical systems (CPS) in our daily
life, their security is becoming ever more important. Remote attestation is a powerful …

Chronos: Timing interference as a new attack vector on autonomous cyber-physical systems

A Li, J Wang, N Zhang - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Timing property plays a vital role in the Cyber-Physical System (CPS) due to its interaction
with the physical world. The smooth operation of these robotic systems often relies on an …

Reward delay attacks on deep reinforcement learning

A Sarkar, J Feng, Y Vorobeychik, C Gill… - … Conference on Decision …, 2022 - Springer
Most reinforcement learning algorithms implicitly assume strong synchrony. We present
novel attacks targeting Q-learning that exploit a vulnerability entailed by this assumption by …

You Can't Always Check What You Wanted:: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Time Internet-of-Things

M Hasan, S Mohan - 2023 IEEE 26th International Symposium …, 2023 - ieeexplore.ieee.org
Modern Internet-of-Things devices are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. We present a “selective checking” …

DT-DS: CAN intrusion detection with decision tree ensembles

J Mehta, G Richard, L Lugosch, D Yu… - ACM Transactions on …, 2023 - dl.acm.org
The controller area network (CAN) protocol, used in many modern vehicles for real-time inter-
device communications, is known to have cybersecurity vulnerabilities, putting passengers …

[PDF][PDF] WIP: Interrupt Attack on TEE-Protected Robotic Vehicles

M Luo, GE Suh - Workshop on Automotive and Autonomous …, 2022 - ndss-symposium.org
Effective coordination of sensor inputs requires correct timestamping of the sensor data for
robotic vehicles. Though the existing trusted execution environment (TEE) can prevent direct …

Who's Afraid of Butterflies? A Close Examination of the Butterfly Attack

S Baruah, P Ekberg, M Hosseinzadeh… - 2023 IEEE Real …, 2023 - ieeexplore.ieee.org
The Butterfly Attack, introduced in an RTSS 2019 paper, was billed as a new kind of timing
attack against control loops in cyber-physical systems. We conduct a close inspection of the …

You Can't Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Cyber-Physical Systems

M Hasan, S Mohan - arXiv preprint arXiv:2304.13956, 2023 - arxiv.org
Cyber-physical systems (CPS) are vulnerable to attacks targeting outgoing actuation
commands that modify their physical behaviors. The limited resources in such systems …