International audienceRuntime verification provides a theoretical provedframework to synthesize monitors from formal specifications.At runtime, these monitors can be used to check that theexecution of the system does not violate a security policy ora safety property. In this paper, we focus on the runtimeverification of safety properties of real-time embedded software.For these systems, it must be ensured that monitoring does notjeopardize the scheduling. To do so, we use a hybrid hardwaresoftwareapproach in the context of System-on-Programmable-Chip. A minimal instrumentation is added to the software toextract the execution trace. The verification is performed byhardware monitors on the FPGA. This implementation makesit possible to obtain ...
COTS peripherals are heavily used in the embed-ded market, but their unpredictability is a threat fo...
© The Author(s) 2013. This article is published with open access at Springerlink.com Abstract We pre...
Untrusted third-party vendors and manufacturers have raised security concerns in hardware supply cha...
International audienceRuntime verification provides a theoretical provedframework to synthesize moni...
International audienceThis paper discusses an implementation of runtimeverification for embedded sof...
The trend towards more commercial-off-the-shelf (COTS) components in complex safety-critical systems...
non-peer-reviewedWith embedded systems growing in hardware and software complexity, it is becoming i...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Presented at INForum - Simpósio de Informática (INFORUM 2015). 7 to 8, Sep, 2015. Portugal.Verificat...
20th International Conference on Reliable Software Technologies - Ada-Europe 2015 (Ada-Europe 2015),...
International audienceEmbedded systems often implement safety critical applications making security ...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Demo in Demo Session, 22nd IEEE Real-Time Embedded Technology & Applications Symposium (RTAS 2016). ...
COTS peripherals are heavily used in the embed-ded market, but their unpredictability is a threat fo...
© The Author(s) 2013. This article is published with open access at Springerlink.com Abstract We pre...
Untrusted third-party vendors and manufacturers have raised security concerns in hardware supply cha...
International audienceRuntime verification provides a theoretical provedframework to synthesize moni...
International audienceThis paper discusses an implementation of runtimeverification for embedded sof...
The trend towards more commercial-off-the-shelf (COTS) components in complex safety-critical systems...
non-peer-reviewedWith embedded systems growing in hardware and software complexity, it is becoming i...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Presented at INForum - Simpósio de Informática (INFORUM 2015). 7 to 8, Sep, 2015. Portugal.Verificat...
20th International Conference on Reliable Software Technologies - Ada-Europe 2015 (Ada-Europe 2015),...
International audienceEmbedded systems often implement safety critical applications making security ...
Embedded systems are subjected to various adversaries including software attacks, physical attacks, ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Demo in Demo Session, 22nd IEEE Real-Time Embedded Technology & Applications Symposium (RTAS 2016). ...
COTS peripherals are heavily used in the embed-ded market, but their unpredictability is a threat fo...
© The Author(s) 2013. This article is published with open access at Springerlink.com Abstract We pre...
Untrusted third-party vendors and manufacturers have raised security concerns in hardware supply cha...