Solutions for Cyber-Physical Systems Ubiquity

[1]  Andreas Herkersdorf,et al.  Spatial and temporal isolation of virtual CAN controllers , 2014, SIGBED.

[2]  Henrik Theiling,et al.  Multicore in Real-Time Systems – Temporal Isolation Challenges due to Shared Resources , 2013, DATE 2013.

[3]  Michael Jacobs Improving the Precision of Approximations in WCET Analysis for Multi-Core Processors , 2013 .

[4]  Lui Raymond Sha Resilient mixed-criticality systems , 2009 .

[5]  Annabelle Lee,et al.  Guidelines for Smart Grid Cyber Security , 2010 .

[6]  Giuseppe Lettieri,et al.  VALE, a switched ethernet for virtual machines , 2012, CoNEXT '12.

[7]  Klara Nahrstedt,et al.  Time Valid One-Time Signature for Time-Critical Multicast Data Authentication , 2009, IEEE INFOCOM 2009.

[8]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[9]  Amey Vinayak Moholkar Security for Cyber-Physical Systems , 2014 .

[10]  Selma Saidi,et al.  A mixed critical memory controller using bank privatization and fixed priority scheduling , 2014, 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications.

[11]  Marco Pistore,et al.  NuSMV 2: An OpenSource Tool for Symbolic Model Checking , 2002, CAV.

[12]  Daqiang Zhang,et al.  Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions , 2014, IEEE Communications Magazine.

[13]  Hiren D. Patel,et al.  Criticality- and Requirement-Aware Bus Arbitration for Multi-Core Mixed Criticality Systems , 2016, 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).

[14]  Christian Prehofer,et al.  embSFI: An Approach for Software Fault Isolation in Embedded Systems , 2016 .

[15]  Shufu Mao,et al.  Hardware Support for Secure Processing in Embedded Systems , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[16]  Don Marti,et al.  OSv - Optimizing the Operating System for Virtual Machines , 2014, USENIX Annual Technical Conference.

[17]  Lui Sha,et al.  Handling mixed-criticality in SoC-based real-time embedded systems , 2009, EMSOFT '09.

[18]  Ramin Yahyapour,et al.  Cloud computing networking: challenges and opportunities for innovations , 2013, IEEE Communications Magazine.

[19]  George Kornaros,et al.  Towards Trusted Apps platforms for open CPS , 2016, 2016 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC).

[20]  Miltos D. Grammatikakis,et al.  Hardware Support for Cost-Effective System-Level Protection in Multi-core SoCs , 2015, 2015 Euromicro Conference on Digital System Design.

[21]  Peter Honeyman,et al.  A brief chronology of medical device security , 2016, Commun. ACM.

[22]  George Kornaros,et al.  TAPPS - Trusted Apps for Open Cyber-Physical Systems , 2015, e-Democracy.

[23]  Björn B. Brandenburg A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems , 2014, 2014 IEEE Real-Time Systems Symposium.

[24]  Zaid Al-Ars,et al.  Accurate and efficient identification of worst-case execution time for multicore processors: A survey , 2013, 2013 8th IEEE Design and Test Symposium.

[25]  John A. Stankovic,et al.  Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.

[26]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[27]  Daniel Raho,et al.  Turning an open source project into a carrier grade vswitch for NFV: Vosyswitch challenges & results , 2016, 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC).

[28]  Kenneth L. McMillan,et al.  Symbolic model checking , 1992 .

[29]  Siddhartha Kumar Khaitan,et al.  Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.

[30]  Tomas Olovsson,et al.  Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[31]  Miodrag Potkonjak,et al.  Trusted sensors and remote sensing , 2010, 2010 IEEE Sensors.

[32]  Henrik Theiling,et al.  Multi-core Interference-Sensitive WCET Analysis Leveraging Runtime Resource Capacity Enforcement , 2014, 2014 26th Euromicro Conference on Real-Time Systems.

[33]  Andreas Herkersdorf,et al.  Performance Isolation Exposure in Virtualized Platforms with PCI Passthrough I/O Sharing , 2014, ARCS.

[34]  Rusty Russell,et al.  virtio: towards a de-facto standard for virtual I/O devices , 2008, OPSR.

[35]  Sanjoy K. Baruah,et al.  Mixed-Criticality Real-Time Scheduling for Multicore Systems , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[36]  Frank Mueller,et al.  Intrusion Detection for CPS Real-Time Controllers , 2015 .

[37]  André Weimerskirch V2V Communication Security: A Privacy Preserving Design for 300 Million Vehicles , 2014 .

[38]  Brent Byunghoon Kang,et al.  SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment , 2015, NDSS.