-
1
-
-
85053513174
-
-
FreeRTOS Accessed: Sep. 2016
-
FreeRTOS. http://www.freertos.org, 2016. Accessed: Sep. 2016.
-
(2016)
-
-
-
2
-
-
85053490873
-
-
https://github.com/emsoft2017restart/restart-based-framework-demo, 2017.
-
(2017)
-
-
-
3
-
-
85014421801
-
Re Secure: A restart-based security protocol for tightly actuated hard real-time systems
-
F. Abdi, M. Hasan, S. Mohan, D. Agarwal, M. Caccamo. ReSecure: A restart-based security protocol for tightly actuated hard real-time systems. In IEEE CERTS, pages 47-54, 2016.
-
(2016)
IEEE CERTS
, pp. 47-54
-
-
Abdi, F.1
Hasan, M.2
Mohan, S.3
Agarwal, D.4
Caccamo, M.5
-
4
-
-
84996483774
-
Reset-based recovery for real-time cyber-physical systems with temporal safety constraints
-
(ETFA 2016)
-
F. Abdi, R. Mancuso, S. Bak, O. Dantsker, M. Caccamo. Reset-based recovery for real-time cyber-physical systems with temporal safety constraints. In IEEE 21st Conference on Emerging Technologies Factory Automation (ETFA 2016), 2016.
-
(2016)
IEEE 21st Conference on Emerging Technologies Factory Automation
-
-
Abdi, F.1
Mancuso, R.2
Bak, S.3
Dantsker, O.4
Caccamo, M.5
-
5
-
-
85019047147
-
Application and system-level software fault tolerance through full system restarts
-
New York, NY, USA ACM
-
F. Abdi, R. Tabish, M. Rungger, M. Zamani, M. Caccamo. Application and system-level software fault tolerance through full system restarts. In Proceedings of the 8th International Conference on Cyber-Physical Systems, ICCPS '17, pages 197-206, New York, NY, USA, 2017. ACM.
-
(2017)
Proceedings of the 8th International Conference on Cyber-Physical Systems, ICCPS '17
, pp. 197-206
-
-
Abdi, F.1
Tabish, R.2
Rungger, M.3
Zamani, M.4
Caccamo, M.5
-
6
-
-
85053521136
-
-
CoRR, abs/1702.06595
-
M. Arroyo, H. Kobayashi, S. Sethumadhavan, J. Yang. FIRED: Frequent inertial resets with diversification for emerging commodity cyber-physical systems. CoRR, abs/1702.06595, 2017.
-
(2017)
FIRED: Frequent Inertial Resets with Diversification for Emerging Commodity Cyber-physical Systems
-
-
Arroyo, M.1
Kobayashi, H.2
Sethumadhavan, S.3
Yang, J.4
-
7
-
-
84901263065
-
-
AVNET Accessed: Apr 2017
-
AVNET. Zedboard hardware user's guide. http://zedboard.org/sites/default/files/documentations/ZedBoard HW UG v2 2.pdf. Accessed: Apr. 2017.
-
Zedboard Hardware User's Guide
-
-
-
8
-
-
67650239588
-
The system-level simplex architecture for improved real-time embedded system safety
-
IEEE
-
S. Bak, D. K. Chivukula, O. Adekunle, M. Sun, M. Caccamo, L. Sha. The system-level simplex architecture for improved real-time embedded system safety. In Real-Time and Embedded Technology and Applications Symposium, 2009. RTAS 2009. 15th IEEE, pages 99-107. IEEE, 2009.
-
(2009)
Real-Time and Embedded Technology and Applications Symposium 2009. RTAS 2009. 15th IEEE
, pp. 99-107
-
-
Bak, S.1
Chivukula, D.K.2
Adekunle, O.3
Sun, M.4
Caccamo, M.5
Sha, L.6
-
9
-
-
84936951807
-
Real-time reachability for verified simplex design
-
IEEE
-
S. Bak, T. T. Johnson, M. Caccamo, L. Sha. Real-time reachability for verified simplex design. In Real-Time Systems Symposium (RTSS), 2014 IEEE, pages 138-148. IEEE, 2014.
-
(2014)
Real-Time Systems Symposium (RTSS) 2014 IEEE
, pp. 138-148
-
-
Bak, S.1
Johnson, T.T.2
Caccamo, M.3
Sha, L.4
-
10
-
-
79961140555
-
Sandboxing controllers for cyber-physical systems
-
Washington, DC, USA IEEE Computer Society
-
S. Bak, K. Manamcheri, S. Mitra, M. Caccamo. Sandboxing controllers for cyber-physical systems. In Proceedings of the 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems, ICCPS '11, pages 3-12, Washington, DC, USA, 2011. IEEE Computer Society.
-
(2011)
Proceedings of the 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems, ICCPS '11
, pp. 3-12
-
-
Bak, S.1
Manamcheri, K.2
Mitra, S.3
Caccamo, M.4
-
11
-
-
16644362894
-
Randomized instruction set emulation
-
Feb
-
E. G. Barrantes, D. H. Ackley, S. Forrest, D. Stefanovíc. Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur., 8(1):3-40, Feb. 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovíc, D.4
-
12
-
-
33746101822
-
Diehard: Probabilistic memory safety for unsafe languages
-
New York, NY, USA ACM
-
E. D. Berger and B. G. Zorn. Diehard: Probabilistic memory safety for unsafe languages. In Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '06, pages 158-168, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '06
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
15
-
-
80053199674
-
Microreboota technique for cheap recovery
-
OSDI'04
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, A. Fox. Microreboota technique for cheap recovery. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation-Volume 6, OSDI'04, pages 31-44, 2004.
-
(2004)
Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation
, vol.6
, pp. 31-44
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
16
-
-
84954127476
-
Jagr: An autonomous self-recovering application server
-
IEEE
-
G. Candea, E. Kiciman, S. Zhang, P. Keyani, A. Fox. Jagr: An autonomous self-recovering application server. In Autonomic Computing Workshop. 2003. Proceedings of the, pages 168-177. IEEE, 2003.
-
(2003)
Autonomic Computing Workshop 2003. Proceedings of the
, pp. 168-177
-
-
Candea, G.1
Kiciman, E.2
Zhang, S.3
Keyani, P.4
Fox, A.5
-
17
-
-
0345757358
-
Practical byzantine fault tolerance and proactive recovery
-
Nov
-
M. Castro and B. Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst., 20(4):398-461, Nov. 2002.
-
(2002)
ACM Trans. Comput. Syst
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
19
-
-
84892609320
-
A survey of software aging and rejuvenation studies
-
Jan.
-
D. Cotroneo, R. Natella, R. Pietrantuono, S. Russo. A survey of software aging and rejuvenation studies. J. Emerg. Technol. Comput. Syst., 10(1):8:1-8:34, Jan. 2014.
-
(2014)
J. Emerg. Technol. Comput. Syst
, vol.10
, Issue.1
, pp. 81-834
-
-
Cotroneo, D.1
Natella, R.2
Pietrantuono, R.3
Russo, S.4
-
21
-
-
0029513524
-
Analysis of software rejuvenation using markov regenerative stochastic petri net
-
S. Garg, A. Puliafito, M. Telek, K. S. Trivedi. Analysis of software rejuvenation using markov regenerative stochastic petri net. In Software Reliability Engineering, 1995. Proceedings., Sixth International Symposium on, pages 180-187. IEEE, 1995.
-
(1995)
Software Reliability Engineering 1995. Proceedings., Sixth International Symposium on IEEE
, pp. 180-187
-
-
Garg, S.1
Puliafito, A.2
Telek, M.3
Trivedi, K.S.4
-
23
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
May 2008
-
D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, W. H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In 2008 IEEE Symposium on Security and Privacy (sp 2008), pages 129-142, May 2008.
-
(2008)
IEEE Symposium on Security and Privacy (Sp
, vol.2008
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.S.2
Ransford, B.3
Clark, S.S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.H.9
-
24
-
-
0028994247
-
Software rejuvenation: Analysis, module and applications
-
IEEE
-
Y. Huang, C. Kintala, N. Kolettis, N. D. Fulton. Software rejuvenation: Analysis, module and applications. In Fault-Tolerant Computing, 1995. FTCS-25. Digest of Papers., Twenty-Fifth International Symposium on, pages 381-390. IEEE, 1995.
-
(1995)
Fault-Tolerant Computing 1995. FTCS-25. Digest of Papers., Twenty-Fifth International Symposium on
, pp. 381-390
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
Fulton, N.D.4
-
25
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
IEEE
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, et al. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy, pages 447-462. IEEE, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
-
26
-
-
85053501206
-
-
Make Linux Accessed: June 2017
-
Make Linux. Super fast boot of embedded linux. http://www.makelinux.com/emb/fastboot/omap, 2017. Accessed: June 2017.
-
(2017)
Super Fast Boot of Embedded Linux
-
-
-
27
-
-
84877600779
-
S3a: Secure system simplex architecture for enhanced security and robustness of cyberphysical systems
-
ACM
-
S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha, M. Caccamo. S3a: Secure system simplex architecture for enhanced security and robustness of cyberphysical systems. In Proceedings of the 2nd ACM international conference on High confidence networked systems, pages 65-74. ACM, 2013.
-
(2013)
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems
, pp. 65-74
-
-
Mohan, S.1
Bak, S.2
Betti, E.3
Yun, H.4
Sha, L.5
Caccamo, M.6
-
28
-
-
85053536860
-
-
Quanser Inc Document Number 644, Revision 2.1
-
Quanser Inc. 3-DOF helicopter reference manual. Document Number 644, Revision 2.1.
-
3-DOF Helicopter Reference Manual
-
-
-
29
-
-
85053536428
-
-
Quanser Inc Accessed: June 2017
-
Quanser Inc. Research papers related to quanser inc. http://www.quanser.com/research papers/Sort=Year-DESC. Accessed: June 2017.
-
Research Papers Related to Quanser Inc
-
-
-
30
-
-
85053536042
-
-
Quanser Inc Accessed: September 2016
-
Quanser Inc. Q8 data acquisition board. http://www.quanser.com/products/q8, 2016. Accessed: September 2016.
-
(2016)
Q8 Data Acquisition Board
-
-
-
33
-
-
0035394327
-
Using simplicity to control complexity
-
20-28, Jul
-
L. Sha. Using simplicity to control complexity. IEEE Software, 18(4):20-28, Jul 2001.
-
(2001)
IEEE Software
, vol.18
, pp. 4
-
-
Sha, L.1
-
34
-
-
77649269780
-
Highly available intrusion-tolerant services with proactive-reactive recovery
-
April
-
P. Sousa, A. N. Bessani, M. Correia, N. F. Neves, P. Verissimo. Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Transactions on Parallel and Distributed Systems, 21(4):452-465, April 2010.
-
(2010)
IEEE Transactions on Parallel and Distributed Systems
, vol.21
, Issue.4
, pp. 452-465
-
-
Sousa, P.1
Bessani, A.N.2
Correia, M.3
Neves, N.F.4
Verissimo, P.5
-
35
-
-
33751050132
-
Proactive resilience through architectural hybridization
-
SAC '06 New York, NY, USA ACM
-
P. Sousa, N. F. Neves, P. Veŕssimo. Proactive resilience through architectural hybridization. In Proceedings of the 2006 ACM Symposium on Applied Computing, SAC '06, pages 686-690, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 2006 ACM Symposium on Applied Computing
, pp. 686-690
-
-
Sousa, P.1
Neves, N.F.2
Veŕssimo, P.3
-
40
-
-
84881247246
-
Intrusion-tolerant architectures: Concepts and design
-
Springer Berlin Heidelberg
-
P. E. Veŕssimo, N. F. Neves, M. P. Correia. Intrusion-tolerant architectures: Concepts and design. In Architecting Dependable Systems, pages 3-36. Springer Berlin Heidelberg, 2003.
-
(2003)
Architecting Dependable Systems
, pp. 3-36
-
-
Veŕssimo, P.E.1
Neves, N.F.2
Correia, M.P.3
-
41
-
-
84971222629
-
TaskShuffler: A schedule randomization protocol for obfuscation against timing inference attacks in realtime systems
-
IEEE
-
M.-K. Yoon, S. Mohan, C.-Y. Chen, L. Sha. TaskShuffler: A schedule randomization protocol for obfuscation against timing inference attacks in realtime systems. In IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), pages 1-12. IEEE, 2016.
-
(2016)
IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)
, pp. 1-12
-
-
Yoon, M.-K.1
Mohan, S.2
Chen, C.-Y.3
Sha, L.4
|