Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and reliability in recent years. ESs that are required to ensure functional cor-rectness under timing constraints are referred to as real-time embedded systems (RTESs). With the emerging trend of utilizing RTESs in safety and reliability critical areas, security of RTESs, especially confidentiality of the communication, becomes of great importance. More recently, side-channel attacks (SCAs) posed serious threats to confidentiality protection mechanisms, namely, cryptographic algorithms. In this work, we present the first analytical framework for quantifying the influence of real-time scheduling policies on the robustness of secret keys against di...
Abstract — In the recent past, Security-sensitive applications, such as electronic transaction proc...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Item does not contain fulltextISVLSI 2014 IEEE Computer Society Annual Symposium on VLSI, 9-11 July ...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very comm...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
peer reviewedMuch effort has been put into improving the predictability of real-time systems, especi...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
The growing complexity and increased networking of securi-ty and safety-critical systems expose them...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Time-triggered real-time systems achieve deterministic behavior using schedules that are constructed...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Abstract — In the recent past, Security-sensitive applications, such as electronic transaction proc...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Item does not contain fulltextISVLSI 2014 IEEE Computer Society Annual Symposium on VLSI, 9-11 July ...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very comm...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
peer reviewedMuch effort has been put into improving the predictability of real-time systems, especi...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
The growing complexity and increased networking of securi-ty and safety-critical systems expose them...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Time-triggered real-time systems achieve deterministic behavior using schedules that are constructed...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Abstract — In the recent past, Security-sensitive applications, such as electronic transaction proc...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...