SoK: Security in real-time systems

M Hasan, A Kashinath, CY Chen, S Mohan - ACM Computing Surveys, 2024 - dl.acm.org
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …

[HTML][HTML] Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

INDRA: Intrusion detection using recurrent autoencoders in automotive embedded systems

VK Kukkala, SV Thiruloga… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Today's vehicles are complex distributed embedded systems that are increasingly being
connected to various external systems. Unfortunately, this increased connectivity makes the …

Latte: L stm self-att ention based anomaly detection in e mbedded automotive platforms

VK Kukkala, SV Thiruloga, S Pasricha - ACM Transactions on Embedded …, 2021 - dl.acm.org
Modern vehicles can be thought of as complex distributed embedded systems that run a
variety of automotive applications with real-time constraints. Recent advances in the …

Lightweight collaborative anomaly detection for the IoT using blockchain

Y Mirsky, T Golomb, Y Elovici - Journal of Parallel and Distributed …, 2020 - Elsevier
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …

Realswatt: Remote software-based attestation for embedded devices under realtime constraints

S Surminski, C Niesler, F Brasser, L Davi… - Proceedings of the …, 2021 - dl.acm.org
Smart factories, critical infrastructures, and medical devices largely rely on embedded
systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies …

Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

Learning execution contexts from system call distribution for anomaly detection in smart embedded system

MK Yoon, S Mohan, J Choi, M Christodorescu… - Proceedings of the …, 2017 - dl.acm.org
Existing techniques used for anomaly detection do not fully utilize the intrinsic properties of
embedded devices. In this paper, we propose a lightweight method for detecting anomalous …

Malicious firmware detection with hardware performance counters

X Wang, C Konstantinou, M Maniatakos… - … on Multi-Scale …, 2016 - ieeexplore.ieee.org
Critical infrastructure components nowadays use microprocessor-based embedded control
systems. It is often infeasible, however, to employ the same level of security measures used …

Leveraging side-channel information for disassembly and security

J Park, F Rahman, A Vassilev, D Forte… - ACM Journal on …, 2019 - dl.acm.org
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …