A Short Review of Security-Aware Techniques in Real-Time Embedded Systems
暂无分享,去创建一个
Jin Sun | Gongxuan Zhang | Tian Wang | Junlong Zhou | Hongxia Chai | Longxia Huang | J. Sun | Gongxuan Zhang | Longxia Huang | Tian Wang | Junlong Zhou | Hongxia Chai
[1] Rakesh Bobba,et al. Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems , 2017, ECRTS.
[2] Tongquan Wei,et al. Thermal-aware correlated two-level scheduling of real-time tasks with reduced processor energy on heterogeneous MPSoCs , 2018, J. Syst. Archit..
[3] Sibin Mohan,et al. Schedule-Based Side-Channel Attack in Fixed-Priority Real-time Systems , 2015 .
[4] Lui Sha,et al. The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety , 2009, 2009 15th IEEE Real-Time and Embedded Technology and Applications Symposium.
[5] Nan Sang,et al. Energy Measurement and Analysis of Security Algorithms for Embedded Systems , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.
[6] Marco Caccamo,et al. S3A: secure system simplex architecture for enhanced security and robustness of cyber-physical systems , 2013, HiCoNS '13.
[7] Kent W. Nixon. Energy-Adaptive Scheduling of Imprecise Computation Tasks for QoS Optimization in Real-Time MPSoC Systems , 2017 .
[8] Arslan Munir,et al. Design and comparative evaluation of GPGPU- and FPGA-based MPSoC ECU architectures for secure, dependable, and real-time automotive CPS , 2017, 2017 IEEE 28th International Conference on Application-specific Systems, Architectures and Processors (ASAP).
[9] Ludovic Apvrille,et al. Security requirements for automotive on-board networks , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).
[10] Xia Zhang,et al. Energy Optimization of Security-Critical Real-Time Applications with Guaranteed Security Protection , 2015, J. Syst. Archit..
[11] Xia Zhang,et al. Adaptive security management of real-time storage applications over NAND based storage systems , 2015, J. Netw. Comput. Appl..
[12] Antonio Cicchetti,et al. Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems , 2012 .
[13] A. Akhmetova. Discovery of Frequent Episodes in Event Sequences , 2006 .
[14] Gabriel Parmer,et al. Predictable, Efficient System-Level Fault Tolerance in C^3 , 2013, 2013 IEEE 34th Real-Time Systems Symposium.
[15] Petru Eles,et al. Co-design techniques for distributed real-time embedded systems with communication security constraints , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[16] Xiao Qin,et al. SAREC: a security-aware scheduling strategy for real-time applications on clusters , 2005, 2005 International Conference on Parallel Processing (ICPP'05).
[17] Zoran A. Salcic,et al. Towards decentralized system-level security for MPSoC-based embedded applications , 2017, J. Syst. Archit..
[18] Xiao Liu,et al. Soft error-aware energy-efficient task scheduling for workflow applications in DVFS-enabled cloud , 2018, J. Syst. Archit..
[19] Petru Eles,et al. Energy-aware design of secure multi-mode real-time embedded systems with FPGA co-processors , 2013, RTNS '13.
[20] Rudolf Kruse,et al. Density Based Clustering: Alternatives to DBSCAN , 2015 .
[21] Man-Ki Yoon,et al. A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems , 2017, ArXiv.
[22] Xia Zhang,et al. Design optimization of secure message communication for energy-constrained distributed real-time systems , 2017, J. Parallel Distributed Comput..
[23] Xia Zhang,et al. Design Optimization of Security-Sensitive Mixed-Criticality Real-Time Embedded Systems , 2013 .
[24] Arvind Easwaran,et al. A systematic security analysis of real-time cyber-physical systems , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[25] Alberto L. Sangiovanni-Vincentelli,et al. Quo Vadis, SLD? Reasoning About the Trends and Challenges of System Level Design , 2007, Proceedings of the IEEE.
[26] Man-Ki Yoon,et al. Integrating security constraints into fixed priority real-time schedulers , 2016, Real-Time Systems.
[27] Rudra Pratap Ojha,et al. A Utilization Based Approach for Secured Real Time Applications on Clusters , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[28] Man-Ki Yoon,et al. A generalized model for preventing information leakage in hard real-time systems , 2015, 21st IEEE Real-Time and Embedded Technology and Applications Symposium.
[29] Alberto L. Sangiovanni-Vincentelli,et al. Security-Aware Design Methodology and Optimization for Automotive Systems , 2015, ACM Trans. Design Autom. Electr. Syst..
[30] Tongquan Wei,et al. Fault-Tolerant Task Scheduling for Mixed-Criticality Real-Time Systems , 2017, J. Circuits Syst. Comput..
[31] Petru Eles,et al. Scheduling with bus access optimization for distributed embedded systems , 2000, IEEE Trans. Very Large Scale Integr. Syst..
[32] Simha Sethumadhavan,et al. Side-channel vulnerability factor: A metric for measuring information leakage , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[33] Nan Sang,et al. Measurement-based research on cryptographic algorithms for embedded real-time systems , 2013, J. Syst. Archit..
[34] Luca Fanucci,et al. MACsec-Based Security for Automotive Ethernet Backbones , 2018, J. Circuits Syst. Comput..
[35] Suvadip Batabyal,et al. Utilization Based Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid (U-SDSA) , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).
[36] Xiao Qin,et al. A New Allocation Scheme for Parallel Applications with Deadline and Security Constraints on Clusters , 2005, 2005 IEEE International Conference on Cluster Computing.
[37] Wei Jiang,et al. Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.
[38] Nan Sang,et al. An Adaptive Risk Control and Security Management for Embedded Real-Time System , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[39] Sang Hyuk Son,et al. Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity' , 2000, IEEE Trans. Knowl. Data Eng..
[40] Sri Parameswaran,et al. SHIELD: A software hardware design methodology for security and reliability of MPSoCs , 2008, 2008 45th ACM/IEEE Design Automation Conference.
[41] Xia Zhang,et al. A Vulnerability Optimization Method for Security-Critical Real-Time Systems , 2013, 2013 IEEE Eighth International Conference on Networking, Architecture and Storage.
[42] Petru Eles,et al. Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.
[43] Neda Paryab. Integrating Security Mechanisms in Hard Real-Time Systems , 2015 .
[44] Marco Caccamo,et al. Reset-based recovery for real-time cyber-physical systems with temporal safety constraints , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[45] Rakesh Bobba,et al. Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems , 2016, 2016 IEEE Real-Time Systems Symposium (RTSS).
[46] J. William Atwood,et al. Securing RTP Packets Using Per-Packet Key Exchange for Real-Time Multimedia , 2013 .
[47] Junlong Zhou,et al. Thermal-Aware Task Scheduling for Energy Minimization in Heterogeneous Real-Time MPSoC Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[48] Alberto L. Sangiovanni-Vincentelli,et al. Security-aware mapping for CAN-based real-time distributed automotive systems , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[49] Xiao Qin,et al. Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling , 2005, JSSPP.
[50] Sri Parameswaran,et al. Ensuring secure program execution in multiprocessor embedded systems: A case study , 2007, 2007 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[51] Pablo Sánchez,et al. Security Estimation in Wireless Sensor Network Simulator , 2016 .
[52] Wei Jiang,et al. Design optimization for security- and safety-critical distributed real-time applications , 2017, Microprocess. Microsystems.
[53] Suvadip Batabyal,et al. Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid , 2016, ICISS.
[54] Ankur Srivastava,et al. A Secure Algorithm for Task Scheduling against Side-channel Attacks , 2014, TrustED '14.
[55] S. Yang,et al. AES-Based Security Coprocessor IC in 0.18-$muhbox m$CMOS With Resistance to Differential Power Analysis Side-Channel Attacks , 2006, IEEE Journal of Solid-State Circuits.