2019 IEEE 37th International Conference on Computer Design (ICCD) 2019
DOI: 10.1109/iccd46524.2019.00035
|View full text |Cite
|
Sign up to set email alerts
|

Security-Driven Codesign with Weakly-Hard Constraints for Real-Time Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 36 publications
0
13
0
Order By: Relevance
“…That is task τ N is invoked at discrete sampling instants. Under the Logical Execution Time (LET) paradigm [46,47,48], which is widely adopted in CPS, the control signal that is computed based on the measurements at sampling instant k is applied to the plant at sampling instant k + 1. This means that there is a fixed samplingto-actuation delay which is equal to ∆T N .…”
Section: Details Of Task τ Nmentioning
confidence: 99%
“…That is task τ N is invoked at discrete sampling instants. Under the Logical Execution Time (LET) paradigm [46,47,48], which is widely adopted in CPS, the control signal that is computed based on the measurements at sampling instant k is applied to the plant at sampling instant k + 1. This means that there is a fixed samplingto-actuation delay which is equal to ∆T N .…”
Section: Details Of Task τ Nmentioning
confidence: 99%
“…This approach is shown to be sound and effective in verifying system safety under weakly-hard constraints. In another of our recent work [10], we consider both issues, and develop a codesign approach to explore the addition of new security monitoring tasks by leveraging weakly-hard constraints for control tasks. The work studies the trade-off between control performance and system security level, when different degrees of deadline misses occur to the control tasks.…”
Section: Cross-layer Design With Weakly-hard Paradigmmentioning
confidence: 99%
“…One extends the work from [34], where the deadline miss model can be upper-bounded by employing typical worst-case analysis (TWCA). The other extends the event-based schedulability analysis in [22]. The event-based schedulability simulates the execution of tasks within a hyper-period and derives the deadline miss patterns for all tasks in a single run.…”
Section: Schedulability Analysismentioning
confidence: 99%
“…Then, there is also limited work on trying to leverage the scheduling flexibility from weakly-hard constraints to improve other design objectives. For instance in [22], a co-design approach is presented to improve system security while ensuring control safety. In [15], application of weakly-hard paradigm to networked systems is discussed.…”
mentioning
confidence: 99%