336,841 research outputs found

    Explicit Clock Temporal Logic in Timing Constraints for Real-Time Systems

    Get PDF
    A form of explicit clock temporal logic (called TLrt) useful in specifying timing constraints on controller actions, a real-time database (rtdb) items, and constraints in a real-time constraint base (rtcb), is presented. Timing as well as other forms of constraints are stored in the rtcb. A knowledge-based approach to ensure the integrity of information in an rtdb is given. The rtcb is realized as a logic program called Constrainer, which is a historyless integrity checker for a real-time database. The consistency and integrity issues for an rtcb and rtdb are investigated. The formal bases for a temporally complete rtdb and knowledgeably complete controller are presented. A partial TLrt specification of a knowledgeable controller for a Gas Burner is given. An illustration of a rtdb and rtcb in the context of the sample real-time system is also given

    Control-Flow Integrity on Real-Time Embedded Systems

    Get PDF
    While security protections continue to be developed for general-purpose computers,real-time computing has remained unprotected against control-flow hijacking attacks.Existing solutions rely on hardware unavailable to embedded systems due to the cost, or impose excessive overhead, leaving real-time applications unable to operate within their time constraints. We propose RECFISH++, a Control-Flow Integrity implementation focused on protecting real-time embedded systems. By modifying LLVM and FreeRTOS, a popular compiler back-end and real-time operating system, we provide an end-to-end solution for protecting any real-time application on the ARM Cortex-M microprocessor against control-flow hijacking attacks

    HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement

    Full text link
    Widespread use of memory unsafe programming languages (e.g., C and C++) leaves many systems vulnerable to memory corruption attacks. A variety of defenses have been proposed to mitigate attacks that exploit memory errors to hijack the control flow of the code at run-time, e.g., (fine-grained) randomization or Control Flow Integrity. However, recent work on data-oriented programming (DOP) demonstrated highly expressive (Turing-complete) attacks, even in the presence of these state-of-the-art defenses. Although multiple real-world DOP attacks have been demonstrated, no efficient defenses are yet available. We propose run-time scope enforcement (RSE), a novel approach designed to efficiently mitigate all currently known DOP attacks by enforcing compile-time memory safety constraints (e.g., variable visibility rules) at run-time. We present HardScope, a proof-of-concept implementation of hardware-assisted RSE for the new RISC-V open instruction set architecture. We discuss our systematic empirical evaluation of HardScope which demonstrates that it can mitigate all currently known DOP attacks, and has a real-world performance overhead of 3.2% in embedded benchmarks

    RTS hypervisor qualification for real-time systems

    Get PDF
    Virtualization is a synonym for the server and cloud computing arena. Recently, it started to be also applied to real-time embedded systems with timing constraints. However, virtualization products for data centers and desktop computing cannot be readily applied to embedded systems because of differences in requirements, use cases, and computer architecture. Bridging the gap between virtualization and real-time requirements imposes the need of real-time virtualization products. Therefore, some embedded software manufacturers have built several real-time hypervisors specialized for embedded systems. Currently, there are several commercial ones such as Greenhills INTEGRITY MultiVisor, Real-Time Systems (RTS) GmbH Hypervisor, Tenasys eVM for Windows, National Instruments Real-Time Hyper Hypervisor, and some others. This paper provides the behavior and performance results of evaluating RTS hypervisor and gives advices of its use for soft or hard real-time embedded systems

    Multipath optimized link state routing for mobile ad hoc networks

    Get PDF
    International audienceMultipath routing protocols for Mobile Ad hoc NETwork (MANET) address the problem of scalability, security (confidentiality and integrity), lifetime of networks, instability of wireless transmissions, and their adaptation to applications. Our protocol, called MP-OLSR (MultiPath OLSR), is a multipath routing protocol based on OLSR. The Multipath Dijkstra Algorithm is proposed to obtain multiple paths. The algorithm gains great flexibility and extensibility by employing different link metrics and cost functions. In addition, route recovery and loop detection are implemented in MP-OLSR in order to improve quality of service regarding OLSR. The backward compatibility with OLSR based on IP source routing is also studied. Simulation based on Qualnet simulator is performed in different scenarios. A testbed is also set up to validate the protocol in real world. The results reveal that MP-OLSR is suitable for mobile, large and dense networks with large traffic, and could satisfy critical multimedia applications with high on time constraints

    Avionics-Based GNSS Integrity Augmentation for UAS mission planning and real-time trajectory optimisation

    Get PDF
    This paper explores the potential of integrating Global Navigation Satellite System (GNSS) Avionics Based Integrity Augmentation (ABIA) functionalities in Unmanned Aerial Systems (UAS) to perform mission planning and real-time trajectory optimisation tasks. In case of mission planning, a pseudo-spectral optimization technique is adopted. For real-time trajectory optimisation a Direct Constrained Optimisation (DCO) method is employed. In this method the aircraft dynamics model is used to generate a number of feasible flight trajectories that also satisfy the GNSS integrity constraints. The feasible trajectories are calculated by initialising the aircraft dynamics model with a manoeuvre identification algorithm. The performance of the proposed GNSS integrity augmentation and trajectory optimisation algorithms was evaluated in representative simulation case studies. Additionally, the ABIA performance was compared with Space-Based and Ground-Based Augmentation Systems (SBAS/GBAS). Simulation results show that the proposed integration scheme is capable of performing safety-critical UAS tasks (CAT III precision approach, UAS Detect-and-Avoid, etc.) when GNSS is used as the primary source of navigation data. There is a synergy with SBAS/GBAS in providing suitable (predictive and reactive) integrity flags in all flight phases. Therefore, the integration of ABIA with SBAS/GBAS is a clear opportunity for future research towards the development of a Space-Ground-Avionics Augmentation Network (SGAAN) for UAS SAA and other safety-critical aviation applications
    • …
    corecore