F. A. Abad, J. V. Woude, Y. Lu, S. Bak, M. Caccamo et al., On-chip control flow integrity check for real time embedded systems, 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), pp.26-31, 2013.

A. Gmbh, ait worst-case execution time estimation tool

C. Chen, S. Mohan, R. Pellizzoni, B. Rakesh, N. Bobba et al., A Novel Side-Channel in Real-Time Schedulers, 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pp.1545-3421, 2019.

R. Chevalier, M. Villatel, D. Plaquin, and G. Hiet, Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode, Proceedings of the 33rd Annual Computer Security Applications Conference, pp.399-411, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01634566

C. Gaisler, Compiler toolchain for the leon processor

C. Cullmann and F. Martin, Data-Flow Based Detection of Loop Bounds, 7th International Workshop on Worst-Case Execution Time Analysis (WCET'07), vol.6, 2007.

J. Fellmuth, T. Göthel, and S. Glesner, Instruction caches in static WCET analysis of artificially diversified software, 30th Euromicro Conference on Real-Time Systems, vol.21, pp.1-21, 2018.

J. Gustafsson, A. Betts, A. Ermedahl, and B. Lisper, The mälardalen wcet benchmarks -past, present and future, Proceedings of the 10th International Workshop on Worst-Case Execution Time Analysis, 2010.

R. Johnson, D. Pearson, and K. Pingali, The program structure tree: Computing control regions in linear time, SIGPLAN Not, vol.29, issue.6, pp.171-185, 1994.

K. Krüger, M. Völp, and G. Fohler, Vulnerability analysis and mitigation of directed timing inference based attacks on time-triggered systems, 30th Euromicro Conference on Real-Time Systems, vol.22, pp.1-22, 1922.

T. Lu and J. Wang, Data-flow bending: On the effectiveness of data-flow integrity, Computers & Security, vol.84, pp.365-375, 2019.

A. Mahmood and E. J. Mccluskey, Concurrent error detection using watchdog processors-a survey, IEEE Transactions on Computers, vol.37, issue.2, pp.160-174, 1988.

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, 2015.

L. O. Murchu, N. Falliere, and E. Chien, W32. stuxnet dossier. White paper, Symantec Corp., Security Response, vol.5, 2011.

S. Nie, L. Liu, and Y. Du, Free-fall: hacking tesla from wireless to can bus, 22 Attack detection through monitoring of timing deviation, vol.23, pp.1-16, 2017.

C. Pilato, K. Wu, S. Garg, R. Karri, and F. Regazzoni, Tainthls: High-level synthesis for dynamic information flow tracking, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-1, 2018.

L. Pouchet, T. Yuki, /. Polybench, and . Url,

H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu et al., On the effectiveness of address-space randomization, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04, pp.298-307, 2004.

P. Silberman and R. Johnson, A comparison of buffer overflow prevention implementations and weaknesses, IDEFENSE, 2004.

C. Song, H. Moon, M. Alam, I. Yun, B. Lee et al., Hdfi: Hardwareassisted data-flow isolation, 2016 IEEE Symposium on Security and Privacy (SP), pp.1-17, 2016.

L. Szekeres, M. Payer, T. Wei, and D. Song, Sok: Eternal war in memory, 2013 IEEE Symposium on Security and Privacy, pp.48-62, 2013.

N. Timmers, A. Spruyt, and M. Witteman, Controlling PC on ARM using fault injection, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.25-35, 2016.

R. J. Walls, N. F. Brown, T. L. Baron, C. A. Shue, H. Okhravi et al., Control-flow integrity for real-time embedded systems, 31st Euromicro Conference on Real-Time Systems, ECRTS 2019, vol.2, 2019.

R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing et al., Staschulat, and Per Stenström. The worst-case execution-time problem -overview of methods and survey of tools, ACM Trans. Embedded Comput. Syst, vol.7, issue.3, pp.1-36, 2008.

J. Wolf, B. Fechner, S. Uhrig, and T. Ungerer, Fine-grained timing and control flow error checking for hard real-time task execution, 7th IEEE International Symposium on Industrial Embedded Systems (SIES'12), pp.2150-3117, 2012.

M. Yoon, S. Mohan, J. Choi, M. Christodorescu, and L. Sha, Learning execution contexts from system call distribution for anomaly detection in smart embedded system, Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp.191-196, 2017.

C. Zimmer, B. Bhat, F. Mueller, and S. Mohan, Time-based intrusion detection in cyber-physical systems, ACM/IEEE 1st International Conference on Cyber-Physical Systems, ICCPS '10, pp.109-118, 2010.