A Short Review of Security-Aware Techniques in Real-Time Embedded Systems

With the rapid development of embedded systems, users and services have been greatly facilitated while also experiencing security threats as a result of cyber-attacks and system vulnerabilities. Cu...

[1]  Rakesh Bobba,et al.  Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems , 2017, ECRTS.

[2]  Tongquan Wei,et al.  Thermal-aware correlated two-level scheduling of real-time tasks with reduced processor energy on heterogeneous MPSoCs , 2018, J. Syst. Archit..

[3]  Sibin Mohan,et al.  Schedule-Based Side-Channel Attack in Fixed-Priority Real-time Systems , 2015 .

[4]  Lui Sha,et al.  The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety , 2009, 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium.

[5]  Nan Sang,et al.  Energy Measurement and Analysis of Security Algorithms for Embedded Systems , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.

[6]  Marco Caccamo,et al.  S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems , 2013, HiCoNS '13.

[7]  Kent W. Nixon Energy-Adaptive Scheduling of Imprecise Computation Tasks for QoS Optimization in Real-Time MPSoC Systems , 2017 .

[8]  Arslan Munir,et al.  Design and comparative evaluation of GPGPU- and FPGA-based MPSoC ECU architectures for secure, dependable, and real-time automotive CPS , 2017, 2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP).

[9]  Ludovic Apvrille,et al.  Security requirements for automotive on-board networks , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).

[10]  Xia Zhang,et al.  Energy Optimization of Security-Critical Real-Time Applications with Guaranteed Security Protection , 2015, J. Syst. Archit..

[11]  Xia Zhang,et al.  Adaptive security management of real-time storage applications over NAND based storage systems , 2015, J. Netw. Comput. Appl..

[12]  Antonio Cicchetti,et al.  Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems , 2012 .

[13]  A. Akhmetova Discovery of Frequent Episodes in Event Sequences , 2006 .

[14]  Gabriel Parmer,et al.  Predictable, Efficient System-Level Fault Tolerance in C^3 , 2013, 2013 IEEE 34th Real-Time Systems Symposium.

[15]  Petru Eles,et al.  Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[16]  Xiao Qin,et al.  SAREC: a security-aware scheduling strategy for real-time applications on clusters , 2005, 2005 International Conference on Parallel Processing (ICPP'05).

[17]  Zoran A. Salcic,et al.  Towards decentralized system-level security for MPSoC-based embedded applications , 2017, J. Syst. Archit..

[18]  Xiao Liu,et al.  Soft error-aware energy-efficient task scheduling for workflow applications in DVFS-enabled cloud , 2018, J. Syst. Archit..

[19]  Petru Eles,et al.  Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors , 2013, RTNS '13.

[20]  Rudolf Kruse,et al.  Density Based Clustering: Alternatives to DBSCAN , 2015 .

[21]  Man-Ki Yoon,et al.  A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems , 2017, ArXiv.

[22]  Xia Zhang,et al.  Design optimization of secure message communication for energy-constrained distributed real-time systems , 2017, J. Parallel Distributed Comput..

[23]  Xia Zhang,et al.  Design Optimization of Security-Sensitive Mixed-Criticality Real-Time Embedded Systems , 2013 .

[24]  Arvind Easwaran,et al.  A systematic security analysis of real-time cyber-physical systems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).

[25]  Alberto L. Sangiovanni-Vincentelli,et al.  Quo Vadis, SLD? Reasoning About the Trends and Challenges of System Level Design , 2007, Proceedings of the IEEE.

[26]  Man-Ki Yoon,et al.  Integrating security constraints into fixed priority real-time schedulers , 2016, Real-Time Systems.

[27]  Rudra Pratap Ojha,et al.  A Utilization Based Approach for Secured Real Time Applications on Clusters , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[28]  Man-Ki Yoon,et al.  A generalized model for preventing information leakage in hard real-time systems , 2015, 21st IEEE Real-Time and Embedded Technology and Applications Symposium.

[29]  Alberto L. Sangiovanni-Vincentelli,et al.  Security-Aware Design Methodology and Optimization for Automotive Systems , 2015, ACM Trans. Design Autom. Electr. Syst..

[30]  Tongquan Wei,et al.  Fault-Tolerant Task Scheduling for Mixed-Criticality Real-Time Systems , 2017, J. Circuits Syst. Comput..

[31]  Petru Eles,et al.  Scheduling with bus access optimization for distributed embedded systems , 2000, IEEE Trans. Very Large Scale Integr. Syst..

[32]  Simha Sethumadhavan,et al.  Side-channel vulnerability factor: A metric for measuring information leakage , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).

[33]  Nan Sang,et al.  Measurement-based research on cryptographic algorithms for embedded real-time systems , 2013, J. Syst. Archit..

[34]  Luca Fanucci,et al.  MACsec-Based Security for Automotive Ethernet Backbones , 2018, J. Circuits Syst. Comput..

[35]  Suvadip Batabyal,et al.  Utilization Based Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid (U-SDSA) , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[36]  Xiao Qin,et al.  A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Clusters , 2005, 2005 IEEE International Conference on Cluster Computing.

[37]  Wei Jiang,et al.  Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.

[38]  Nan Sang,et al.  An Adaptive Risk Control and Security Management for Embedded Real-Time System , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[39]  Sang Hyuk Son,et al.  Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity' , 2000, IEEE Trans. Knowl. Data Eng..

[40]  Sri Parameswaran,et al.  SHIELD: A software hardware design methodology for security and reliability of MPSoCs , 2008, 2008 45th ACM/IEEE Design Automation Conference.

[41]  Xia Zhang,et al.  A Vulnerability Optimization Method for Security-Critical Real-Time Systems , 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage.

[42]  Petru Eles,et al.  Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.

[43]  Neda Paryab Integrating Security Mechanisms in Hard Real-Time Systems , 2015 .

[44]  Marco Caccamo,et al.  Reset-based recovery for real-time cyber-physical systems with temporal safety constraints , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[45]  Rakesh Bobba,et al.  Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems , 2016, 2016 IEEE Real-Time Systems Symposium (RTSS).

[46]  J. William Atwood,et al.  Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia , 2013 .

[47]  Junlong Zhou,et al.  Thermal-Aware Task Scheduling for Energy Minimization in Heterogeneous Real-Time MPSoC Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[48]  Alberto L. Sangiovanni-Vincentelli,et al.  Security-aware mapping for CAN-based real-time distributed automotive systems , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[49]  Xiao Qin,et al.  Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling , 2005, JSSPP.

[50]  Sri Parameswaran,et al.  Ensuring secure program execution in multiprocessor embedded systems: A case study , 2007, 2007 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[51]  Pablo Sánchez,et al.  Security Estimation in Wireless Sensor Network Simulator , 2016 .

[52]  Wei Jiang,et al.  Design optimization for security- and safety-critical distributed real-time applications , 2017, Microprocess. Microsystems.

[53]  Suvadip Batabyal,et al.  Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid , 2016, ICISS.

[54]  Ankur Srivastava,et al.  A Secure Algorithm for Task Scheduling against Side-channel Attacks , 2014, TrustED '14.

[55]  S. Yang,et al.  AES-Based Security Coprocessor IC in 0.18-$muhbox m$CMOS With Resistance to Differential Power Analysis Side-Channel Attacks , 2006, IEEE Journal of Solid-State Circuits.