2019 IEEE 37th International Conference on Computer Design (ICCD) 2019
DOI: 10.1109/iccd46524.2019.00037
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…The practicality of the approach is validated in a simulated testbed environment [72]. Furthermore, in [71], an instrumentationbased defense technique is presented employing a sub-optimal plan to secure CPES in real-time. Even though the discussed defense and mitigation mechanisms may not be applicable for all cyber-attack scenarios, research and development in this direction contribute towards understanding attackers' tactics and defending against them in order to secure CPES.…”
Section: ) Attack Mitigations and Defenses In Cpesmentioning
confidence: 99%
“…The practicality of the approach is validated in a simulated testbed environment [72]. Furthermore, in [71], an instrumentationbased defense technique is presented employing a sub-optimal plan to secure CPES in real-time. Even though the discussed defense and mitigation mechanisms may not be applicable for all cyber-attack scenarios, research and development in this direction contribute towards understanding attackers' tactics and defending against them in order to secure CPES.…”
Section: ) Attack Mitigations and Defenses In Cpesmentioning
confidence: 99%
“…5.1.2 Trade-off security for schedulability. While RECFISH provides a schedulability study of common CFI techniques, Hao et al [43] provides a novel technique to improve the schedulability of a real-time system by trading-off security with system schedulability. They focus on defending against ROP attacks (Section 1).…”
Section: Cfi With An Rtosmentioning
confidence: 99%
“…Hao et al [ 10 ] developed a strategy for effectively computing an execution plan that optimizes the number of engineered code iterations to achieve maximum protection impact while ensuring the guarded task system's real-time controllability through a novel reaction time analysis. They demonstrated how to incorporate protection mechanisms into practical cases.…”
Section: Introductionmentioning
confidence: 99%