Securing real-time internet-of-things

CY Chen, M Hasan, S Mohan - Sensors, 2018 - mdpi.com
Modern embedded and cyber-physical systems are ubiquitous. Many critical cyber-physical
systems have real-time requirements (eg, avionics, automobiles, power grids, manufacturing …

Taskshuffler: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems

MK Yoon, S Mohan, CY Chen… - 2016 IEEE Real-Time and …, 2016 - ieeexplore.ieee.org
The high degree of predictability in real-time systems makes it possible for adversaries to
launch timing inference attacks such as those based on side-channels and covert-channels …

Vulnerability of controller area network to schedule-based attacks

S Hounsinou, M Stidd, U Ezeobi… - 2021 IEEE Real …, 2021 - ieeexplore.ieee.org
The secure functioning of automotive systems is vital to the safety of their passengers and
other roadway users. One of the critical functions for safety is the controller area network …

System auditing for real-time systems

A Bansal, A Kandikuppa, M Hasan, CY Chen… - ACM Transactions on …, 2023 - dl.acm.org
System auditing is an essential tool for detecting malicious events and conducting forensic
analysis. Although used extensively on general-purpose systems, auditing frameworks have …

A taxonomy of side channel attacks on critical infrastructures and relevant systems

N Tsalis, E Vasilellis, D Mentzelioti… - … Security and Resilience …, 2019 - Springer
Abstract Information disclosure leads to serious exploits, disruption or damage of critical
operations and privacy breaches, both in Critical Infrastructures (CIs) and Industrial Control …

Contego: An adaptive framework for integrating security tasks in real-time systems

M Hasan, S Mohan, R Pellizzoni, RB Bobba - arXiv preprint arXiv …, 2017 - arxiv.org
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to
unknown security flaws, and threats to RTS are growing in both number and sophistication …

Towards efficient auditing for real-time systems

A Bansal, A Kandikuppa, CY Chen, M Hasan… - … on Research in …, 2022 - Springer
Abstract System auditing is a powerful tool that provides insight into the nature of suspicious
events in computing systems, allowing machine operators to detect and subsequently …

Task parameters analysis in schedule-based timing side-channel attack

S Liu, W Yi - IEEE access, 2020 - ieeexplore.ieee.org
Recent work has shown that the timing behavior of a real-time system can be utilized by
attackers for various adverse purposes via schedule-based timing side-channel attacks. An …

Leaking your engine speed by spectrum analysis of real-time scheduling sequences

S Liu, N Guan, D Ji, W Liu, X Liu, W Yi - Journal of Systems Architecture, 2019 - Elsevier
This paper identifies and studies a new security/privacy issue for automobile vehicles.
Specifically, attackers can infer the engine speed of a vehicle by observing and analyzing …

A covert queueing channel in fcfs schedulers

AE Ghassami, N Kiyavash - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We study covert queueing channels (CQCs), which are a kind of covert timing channel that
may be exploited in shared queues across supposedly isolated users. In our system model …