peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that are constructed offline, based on scheduling constraints. Their deterministic behavior makes time-triggered systems suitable for usage in safety-critical environments, like avionics. However, this determinism also allows attackers to fine-tune attacks that can be carried out after studying the behavior of the system through side channels, targeting safety-critical victim tasks. Replication – i.e., the execution of task variants across different cores – is inherently able to tolerate both accidental and malicious faults (i.e. attacks) as long as these faults are independent of one another. Yet, targeted attacks on the timing behavior of tasks wh...
Safety-critical real-time systems, including real-time cyber-physical and industrial control systems...
The problem of defending software against tampering by a malicious host is not expected to be solved...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...
Much effort has been put into improving the predictability of real-time systems, especially in safet...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
Cyber-physical systems are realized as those systems where the computation, communication and physic...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
The Time-Triggered Architecture (TTA) presents a blueprint for building safe and real-time constrain...
The high degree of predictability in hard real-time systems makes it possible for adversaries to lau...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Time-randomized processor (TRP) architectures have been shown as one of the most promising approache...
Safety-critical real-time systems, including real-time cyber-physical and industrial control systems...
The problem of defending software against tampering by a malicious host is not expected to be solved...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...
peer reviewedTime-triggered real-time systems achieve deterministic behavior using schedules that ar...
Much effort has been put into improving the predictability of real-time systems, especially in safet...
Schedule randomization is one of the recently introduced security defenses against schedule-based at...
Covert timing channels in real-time systems allow adversaries to not only exfiltrate application se...
Cyber-physical systems are realized as those systems where the computation, communication and physic...
Control systems can be vulnerable to security threats where an attacker gathers information about th...
The Time-Triggered Architecture (TTA) presents a blueprint for building safe and real-time constrain...
The high degree of predictability in hard real-time systems makes it possible for adversaries to lau...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Abstract. The problem of defending software against tampering by a malicious host is not expected to...
We discuss a simplified version of the timing attack to illustrate a connection between security and...
Time-randomized processor (TRP) architectures have been shown as one of the most promising approache...
Safety-critical real-time systems, including real-time cyber-physical and industrial control systems...
The problem of defending software against tampering by a malicious host is not expected to be solved...
International audienceReal-time embedded systems (RTES) are required to interact more and more with ...