Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being built as an aggregation of embedded platforms. Together with the soaring number of such systems and the current trends of increased connectivity, new security concerns are emerging. Classic approaches to security are not often suitable for embedded platforms. In this paper we propose a hardware based approach for checking the integrity of code flow of real-time tasks whit precisely predictable overheads that do not affect the critical path. Specifically, we employ a hardware module to perform control flow graph (CFG) validation at run-time of real-time component. For this purpose, we developed a binary-based, CFG generation tool. In addition,...
A common requirement of embedded software in charge of safety tasks is to guarantee the identificati...
This paper investigates the effects of a class of transient faults, the so-called Single Event Upset...
While security protections continue to be developed for general-purpose computers,real-time computin...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
A popular software attack on a program is by transferring the program control to malicious code inse...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceEmbedded systems often implement safety critical applications making security ...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
A common requirement of embedded software in charge of safety tasks is to guarantee the identificati...
This paper investigates the effects of a class of transient faults, the so-called Single Event Upset...
While security protections continue to be developed for general-purpose computers,real-time computin...
Abstract—Modern industrial plants, vehicles and other cyber-physical systems are increasingly being ...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
A popular software attack on a program is by transferring the program control to malicious code inse...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
International audienceEmbedded systems often implement safety critical applications making security ...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-crit...
CFI is a computer security technique that detects runtime attacks by monitoring a program's branchin...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
A common requirement of embedded software in charge of safety tasks is to guarantee the identificati...
This paper investigates the effects of a class of transient faults, the so-called Single Event Upset...
While security protections continue to be developed for general-purpose computers,real-time computin...