Item does not contain fulltextISVLSI 2014 IEEE Computer Society Annual Symposium on VLSI, 9-11 July 2014, Tampa, Florid
Real-time critical systems have to comply with stringent timing constraints, otherwise, disastrous c...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
peer reviewedRandom delays are often inserted in embedded software to protect against side-channel a...
Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and ...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very comm...
peer reviewedMuch effort has been put into improving the predictability of real-time systems, especi...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...
Quantitative information-flow analysis (QIF) offers methods for reasoning about information-theoreti...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Real-time critical systems have to comply with stringent timing constraints, otherwise, disastrous c...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
peer reviewedRandom delays are often inserted in embedded software to protect against side-channel a...
Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and ...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very comm...
peer reviewedMuch effort has been put into improving the predictability of real-time systems, especi...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
Traditionally, most cryptographic algorithms were executed on server computers with high computation...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...
Quantitative information-flow analysis (QIF) offers methods for reasoning about information-theoreti...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Real-time critical systems have to comply with stringent timing constraints, otherwise, disastrous c...
Mathematical analysis of possible covert timing channels is a requirement for certification of high ...
peer reviewedRandom delays are often inserted in embedded software to protect against side-channel a...