International audienceReal-time embedded systems (RTES) are required to interact more and more with their environment, thereby increasing their attack surface. Recent security breaches on car brakes and other critical components have already proven the feasibility of attacks on RTES. Such attacks may change the control-flow of the programs, which may lead to violations of the system's timing constraints. In this paper, we present a technique to detect attacks in RTES based on timing information. Our technique, designed for single-core processors, is based on a monitor implemented in hardware to preserve the predictability of instrumented programs. The monitor uses timing information (Worst-Case Execution Time-WCET) of code regions to detect...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
A new approach for detecting security attacks on real-time embedded applications by using ...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
With billions of networked connected embedded systems, the security historically provided by the iso...
Abstract—The inherent limitations of embedded systems make them particularly vulnerable to attacks. ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
In this work, we present a novel approach, called Detector+, to detect, isolate, and prevent timing-...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Over the past decades, the major objectives of computer design have been to improve performance and ...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
A new approach for detecting security attacks on real-time embedded applications by using ...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
Malware is a serious threat to network-connected embedded systems, as evidenced by the continued and...
Historically, embedded systems used to be physically isolated, and an attacker neededphysical access...
With billions of networked connected embedded systems, the security historically provided by the iso...
Abstract—The inherent limitations of embedded systems make them particularly vulnerable to attacks. ...
We introduce a run-time security monitor for embedded system applications that detects both known an...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Security in CPS-based real-time embedded systems controlling the power grid has been an afterthought...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
In this work, we present a novel approach, called Detector+, to detect, isolate, and prevent timing-...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
Over the past decades, the major objectives of computer design have been to improve performance and ...
This paper presents a unique security approach for detecting cyber-attacks against embedded systems ...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
A new approach for detecting security attacks on real-time embedded applications by using ...