Covert spoofing algorithm of UAV based on GPS/INS-integrated navigation

Y Guo, M Wu, K Tang, J Tie, X Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A covert spoofing algorithm of an unmanned aerial vehicle (UAV) based on GPS/inertial-
navigation-system-integrated navigation is analyzed in this paper. The proposed algorithm …

A systematic review on security aware real-time task scheduling

S Singh - Sustainable Computing: Informatics and Systems, 2023 - Elsevier
Nowadays, security and scheduling are the most crucial aspects of each distributed real-
time application due to the rapidly enhanced use of such applications. This study presents a …

Density tradeoffs of non-volatile memory as a replacement for SRAM based last level cache

K Korgaonkar, I Bhati, H Liu, J Gaur… - 2018 ACM/IEEE 45th …, 2018 - ieeexplore.ieee.org
Increasing the capacity of the Last Level Cache (LLC) can help scale the memory wall. Due
to prohibitive area and leakage power, however, growing conventional SRAM LLC already …

A short review of security-aware techniques in real-time embedded systems

H Chai, G Zhang, J Zhou, J Sun, L Huang… - Journal of Circuits …, 2019 - World Scientific
With the rapid development of embedded systems, users and services have been greatly
facilitated while also experiencing security threats as a result of cyber-attacks and system …

Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems

K Krüger, M Volp, G Fohler - Leibniz International Proceedings in …, 2018 - orbilu.uni.lu
Much effort has been put into improving the predictability of real-time systems, especially in
safety-critical environments, which provides designers with a rich set of methods and tools to …

Vulnerability of controller area network to schedule-based attacks

S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …

Mixed criticality systems with varying context switch costs

RI Davis, S Altmeyer, A Burns - 2018 IEEE Real-Time and …, 2018 - ieeexplore.ieee.org
In mixed criticality systems, it is vital to ensure that there is sufficient separation between
tasks of LO-and HI-criticality applications, so that the behavior or mis-behavior of the former …

Maximizing the security level of real-time software while preserving temporal constraints

S Di Leonardi, F Aromolo, P Fara, G Serra… - IEEE …, 2023 - ieeexplore.ieee.org
Embedded computing systems are becoming increasingly relevant in the Internet of Things
(IoT) and edge computing domains, where they are often employed as the control entity of a …

Contego: An adaptive framework for integrating security tasks in real-time systems

M Hasan, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2017 - arxiv.org
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …

A design-space exploration for allocating security tasks in multicore real-time systems

M Hasan, S Mohan, R Pellizzoni… - … Design, Automation & …, 2018 - ieeexplore.ieee.org
The increased capabilities of modern real-time systems (RTS) expose them to various
security threats. Recently, frameworks that integrate security tasks without perturbing the real …