- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0005000000000000
- More
- Availability
-
41
- Author / Contributor
- Filter by Author / Creator
-
-
Ward, Bryan C. (3)
-
Anderson, James H. (2)
-
Baruah, Sanjoy (2)
-
Caspin, Shai (2)
-
Nemitz, Catherine E. (2)
-
Zhang, Ning (2)
-
Burow, Nathan (1)
-
Chantem, Thidapat (1)
-
Clifford, Alexandra (1)
-
Ekberg, Pontus (1)
-
Furgala, Juliana (1)
-
Gadepalli, Phani Kishore (1)
-
Hosseinzadeh, Mehdi (1)
-
Jero, Samuel (1)
-
Khazan, Roger (1)
-
Lemieux-Mack, Cailani (1)
-
Li, Ao (1)
-
Nord, Claire (1)
-
Okhravi, Hamed (1)
-
Pan, Runyu (1)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available December 10, 2025
-
Baruah, Sanjoy; Ekberg, Pontus; Hosseinzadeh, Mehdi; Li, Ao; Ward, Bryan; Zhang, Ning (, IEEE Real-Time Systems Symposium (RTSS))The Butterfly Attack, introduced in an RTSS 2019 paper, was billed as a new kind of timing attack against control loops in cyber-physical systems. We conduct a close inspection of the Butterfly Attack in order to identify the root vulnerability that it exploits, and show that an appropriate application of real-time scheduling theory provides an effective countermeasure. We propose improved defenses against this and similar attacks by drawing upon techniques from real-time scheduling theory, control theory, and systems implementation, that are both provably secure and are able to make efficient use of computing resources.more » « less
-
Nord, Claire; Caspin, Shai; Nemitz, Catherine E.; Shrobe, Howard; Okhravi, Hamed; Anderson, James H.; Burow, Nathan; Ward, Bryan C. (, Proceedings of the 42nd IEEE Real-Time Systems Symposium)
-
Nemitz, Catherine E.; Caspin, Shai; Anderson, James H.; Ward, Bryan C. (, Proceedings of the 33rd Euromicro Conference on Real-Time Systems)
-
Jero, Samuel; Furgala, Juliana; Pan, Runyu; Gadepalli, Phani Kishore; Clifford, Alexandra; Ye, Bite; Khazan, Roger; Ward, Bryan C.; Parmer, Gabriel; Skowyra, Richard (, IEEE 27th Real-Time and Embedded Technology and Applications Symposium (RTAS))null (Ed.)
An official website of the United States government
