Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought, but it is becoming a critical issue as CPS systems are net-worked and inter-dependent. This work presents a set of mechanisms for time-based intrusion detection, i.e., the execution of unauthorized instructions in real-time CPS environments. The novelty is the utilization of information obtained by static timing analysis for intrusion detection. Real-time CPS systems are unique in that timing bounds on code sections are readily available since they are required for schedu-lability analysis. We demonstrate how micro-timings can be exploited for multiple granularity levels of application code to track execution progress. Through bounds checki...
International audienceIndustrial control systems (ICS) can be subject to highly sophisticated attack...
Memory-safety attacks are one of the most critical threats against Cyber-Physical Systems (CPS). As ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
With billions of networked connected embedded systems, the security historically provided by the iso...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
Cyber-Physical Systems (CPSes) are being widely deployed in security- critical scenarios such as sma...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
Security violations are becoming more common in real-time systems - an area that was considered to b...
Abstract — This paper describes a variation of a kernel-level Intrusion Detection System (IDS). In p...
Cyber-physical systems (CPS) integrate computation and communication capabilities to monitor and con...
International audienceIndustrial control systems (ICS) can be subject to highly sophisticated attack...
Memory-safety attacks are one of the most critical threats against Cyber-Physical Systems (CPS). As ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
With billions of networked connected embedded systems, the security historically provided by the iso...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
Cyber-Physical Systems (CPSes) are being widely deployed in security- critical scenarios such as sma...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
Security violations are becoming more common in real-time systems - an area that was considered to b...
Abstract — This paper describes a variation of a kernel-level Intrusion Detection System (IDS). In p...
Cyber-physical systems (CPS) integrate computation and communication capabilities to monitor and con...
International audienceIndustrial control systems (ICS) can be subject to highly sophisticated attack...
Memory-safety attacks are one of the most critical threats against Cyber-Physical Systems (CPS). As ...
Building systems with rigorous security guarantees is difficult, because most programming languages ...