Real-time critical systems have to comply with stringent timing constraints, otherwise, disastrous consequences can occur at runtime. A large effort has been made to propose models and tools to verify timing constraints by schedulability analysis at the early stages of system designs. Fewer efforts have been made on verifying the security properties in these systems despite the fact that sinister consequences can also happen if these properties are compromised. In this article, we investigate how to jointly verify security and timing constraints. We show how to model a security architecture (MILS) and how to verify both timing constraints and security properties. Schedulability is investigated by the mean of scheduling analysis methods impl...
Item does not contain fulltextISVLSI 2014 IEEE Computer Society Annual Symposium on VLSI, 9-11 July ...
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security p...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
This is the author's version of the work. It is posted here by permission of ACM for your personal u...
Real-time systems are found in an increasing variety of application elds. Usually, they are embedded...
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature especially wh...
Real-time embedded systems need to be analyzed at an early stage in order to detect temporal vulnera...
International audienceMany tasks in safety-critical embedded systems have hard real-time characteris...
Software’s become an important part of our daily life as they are now used in many heterogeneous dev...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Safety-critical real-time systems, including real-time cyber-physical and industrial control systems...
International audienceDevelopers of safety-critical real-time systems have to ensure that their syst...
International audienceExisting concepts for ensuring the correctness of the timing behavior of real-...
peer reviewedMuch effort has been put into improving the predictability of real-time systems, especi...
Abstract—Over the past decades several approaches for schedu-lability analysis have been proposed fo...
Item does not contain fulltextISVLSI 2014 IEEE Computer Society Annual Symposium on VLSI, 9-11 July ...
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security p...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
This is the author's version of the work. It is posted here by permission of ACM for your personal u...
Real-time systems are found in an increasing variety of application elds. Usually, they are embedded...
Securing critical systems such as Cyber-Physical Systems (CPS) is an important feature especially wh...
Real-time embedded systems need to be analyzed at an early stage in order to detect temporal vulnera...
International audienceMany tasks in safety-critical embedded systems have hard real-time characteris...
Software’s become an important part of our daily life as they are now used in many heterogeneous dev...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Safety-critical real-time systems, including real-time cyber-physical and industrial control systems...
International audienceDevelopers of safety-critical real-time systems have to ensure that their syst...
International audienceExisting concepts for ensuring the correctness of the timing behavior of real-...
peer reviewedMuch effort has been put into improving the predictability of real-time systems, especi...
Abstract—Over the past decades several approaches for schedu-lability analysis have been proposed fo...
Item does not contain fulltextISVLSI 2014 IEEE Computer Society Annual Symposium on VLSI, 9-11 July ...
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29Security p...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...