Learn More
In this article, we address both security and safety requirements and solve security-aware design problems for the controller area network (CAN) protocol and time division multiple access (TDMA)-based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general(More)
The safety of real-time embedded systems relies on both functional and timing correctness. On the timing side, real-time constraints are set on task executions, and missing them may lead to system failure. On the functional side, soft errors have become a major concern. Various soft error tolerance strategies are proposed for soft error detection and(More)
We consider training probabilistic classifiers in the case that the number of classes is too large to perform exact normalisation over all classes. We show that the source of high variance in standard sampling approximations is due to simply not including the correct class of the datapoint into the approximation. To account for this we explicitly sum over a(More)
Security attacks may have disruptive consequences on cyber-physical systems, and lead to significant social and economic losses. Building secure cyber-physical systems is particularly challenging due to the variety of attack surfaces from the cyber and physical components, and often to limited computation and communication resources. In this paper, we(More)
In this article, we propose a new lifetime task optimization technique for real-time embedded processors considering the electromigration-induced reliability. The new approach is based on a recently proposed physics-based electromigration (EM) model for more accurate EM assessment of a power grid network at the chip level. We apply the dynamic voltage and(More)
Cyber-security has emerged as a pressing issue for transportation systems. Studies have shown that attackers can attack modern vehicles from a variety of interfaces and gain access to the most safety-critical components. Such threats become even broader and more challenging with the emergence of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)(More)
To support emerging applications in autonomous and semi-autonomous driving, next-generation automotive systems will be equipped with an increasing number of heterogeneous components (sensors, actuators and computation units connected through various buses), and have to process a high volume of data to percept the environment accurately and efficiently.(More)
Next-generation autonomous and semi-autonomous vehicles will not only precept the environment with their own sensors, but also communicate with other vehicles and surrounding infrastructures for vehicle safety and transportation efficiency. The design, analysis and validation of various vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)(More)
Demand response (DR) is an effective mechanism in improving power system efficiency and reducing energy cost for customers. However, DR processes might be vulnerable to cyber attacks from the usage of advanced metering infrastructure and wide-area network to exchange information. In this paper, we study potential attacks for a proactive demand participation(More)
The most important blocks in the digital part of a RFID reader are the MCU which controls all the system work in an efficient way and the modulator which is used to accomplish the digital signal processing. As now most commercial RFID readers are discrete component design and researching on implementation of single chip RFID reader is few, this paper point(More)