On-chip control flow integrity check for real time embedded systems, 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), pp.26-31, 2013. ,
ait worst-case execution time estimation tool ,
A Novel Side-Channel in Real-Time Schedulers, 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.1545-3421, 2019. ,
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode, Proceedings of the 33rd Annual Computer Security Applications Conference, pp.399-411, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01634566
Compiler toolchain for the leon processor ,
Data-Flow Based Detection of Loop Bounds, 7th International Workshop on Worst-Case Execution Time Analysis (WCET'07), vol.6, 2007. ,
Instruction caches in static WCET analysis of artificially diversified software, 30th Euromicro Conference on Real-Time Systems, vol.21, pp.1-21, 2018. ,
The mälardalen wcet benchmarks -past, present and future, Proceedings of the 10th International Workshop on Worst-Case Execution Time Analysis, 2010. ,
The program structure tree: Computing control regions in linear time, SIGPLAN Not, vol.29, issue.6, pp.171-185, 1994. ,
Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems, 30th Euromicro Conference on Real-Time Systems, vol.22, pp.1-22, 1922. ,
Data-flow bending: On the effectiveness of data-flow integrity, Computers & Security, vol.84, pp.365-375, 2019. ,
Concurrent error detection using watchdog processors-a survey, IEEE Transactions on Computers, vol.37, issue.2, pp.160-174, 1988. ,
Remote exploitation of an unaltered passenger vehicle, 2015. ,
, W32. stuxnet dossier. White paper, Symantec Corp., Security Response, vol.5, 2011.
Free-fall: hacking tesla from wireless to can bus, 22 Attack detection through monitoring of timing deviation, vol.23, pp.1-16, 2017. ,
Tainthls: High-level synthesis for dynamic information flow tracking, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-1, 2018. ,
,
On the effectiveness of address-space randomization, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04, pp.298-307, 2004. ,
A comparison of buffer overflow prevention implementations and weaknesses, IDEFENSE, 2004. ,
Hdfi: Hardwareassisted data-flow isolation, 2016 IEEE Symposium on Security and Privacy (SP), pp.1-17, 2016. ,
Sok: Eternal war in memory, 2013 IEEE Symposium on Security and Privacy, pp.48-62, 2013. ,
Controlling PC on ARM using fault injection, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.25-35, 2016. ,
Control-flow integrity for real-time embedded systems, 31st Euromicro Conference on Real-Time Systems, ECRTS 2019, vol.2, 2019. ,
Staschulat, and Per Stenström. The worst-case execution-time problem -overview of methods and survey of tools, ACM Trans. Embedded Comput. Syst, vol.7, issue.3, pp.1-36, 2008. ,
Fine-grained timing and control flow error checking for hard real-time task execution, 7th IEEE International Symposium on Industrial Embedded Systems (SIES'12), pp.2150-3117, 2012. ,
Learning execution contexts from system call distribution for anomaly detection in smart embedded system, Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp.191-196, 2017. ,
Time-based intrusion detection in cyber-physical systems, ACM/IEEE 1st International Conference on Cyber-Physical Systems, ICCPS '10, pp.109-118, 2010. ,