To isolate computations from denial of service (DoS) at-tacks and other forms of adversarial interference, it is nec-essary to constrain the effects of interactions among com-putations. This paper makes four contributions to research on isolation of computations from adversarial interference: (1) it describes the design and implementation of a kernel-level scheduling policy to control the effects of adversar-ial attacks on computations ’ execution; (2) it presents for-mal models of the system components that are involved in a representative DoS attack scenario; (3) it shows how model checking can be used to analyze that example sce-nario, under default Linux scheduling semantics and under our scheduling policy design; and (4) it presents em...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...
Popular security techniques such as public-private key encryption, firewalls, and role-based access c...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
Distributed programs are often instrumented for collecting information to assist in analyzing the be...
Abstract. Denial of Service (DoS) attack has been identified in security surveys as the second large...
iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper...
An important class of remotely applicable security attacks concerns time. You can attack somebody by...
Abstract – Hardware Trust is an emerging problem in semiconduc-tor integrated circuit (IC) security ...
... attacks is becoming ever more challenging with the vast resources and techniques increasingly av...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
A virtualized environment (VE) is expected to provide secure logical isolation across the co-located...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...
Popular security techniques such as public-private key encryption, firewalls, and role-based access c...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
Distributed programs are often instrumented for collecting information to assist in analyzing the be...
Abstract. Denial of Service (DoS) attack has been identified in security surveys as the second large...
iv vAbstract Interrupt-related covert channels allow two processes running on a single system to com...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper...
An important class of remotely applicable security attacks concerns time. You can attack somebody by...
Abstract – Hardware Trust is an emerging problem in semiconduc-tor integrated circuit (IC) security ...
... attacks is becoming ever more challenging with the vast resources and techniques increasingly av...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
A virtualized environment (VE) is expected to provide secure logical isolation across the co-located...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. Information flow control allows untrusted code to access sensitive and trustworthy informa...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...