{"id":"https://openalex.org/W2124666319","doi":"https://doi.org/10.1145/2420950.2420960","title":"Enabling trusted scheduling in embedded systems","display_name":"Enabling trusted scheduling in embedded systems","publication_year":2012,"publication_date":"2012-12-03","ids":{"openalex":"https://openalex.org/W2124666319","doi":"https://doi.org/10.1145/2420950.2420960","mag":"2124666319"},"language":"en","primary_location":{"id":"doi:10.1145/2420950.2420960","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2420950.2420960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038851181","display_name":"Ramya Jayaram Masti","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Ramya Jayaram Masti","raw_affiliation_strings":["ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046181796","display_name":"Claudio Marforio","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Claudio Marforio","raw_affiliation_strings":["ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038017695","display_name":"Aanjhan Ranganathan","orcid":"https://orcid.org/0000-0003-0464-5861"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Aanjhan Ranganathan","raw_affiliation_strings":["ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009355477","display_name":"Aur\u00e9lien Francillon","orcid":"https://orcid.org/0000-0003-0584-8732"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Aur\u00e9lien Francillon","raw_affiliation_strings":["Eurecom, Sophia-Antipolis, France","EURECOM Sophia Antipolis, France#TAB#"],"affiliations":[{"raw_affiliation_string":"Eurecom, Sophia-Antipolis, France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"EURECOM Sophia Antipolis, France#TAB#","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077290467","display_name":"Sr\u0111jan \u010capkun","orcid":"https://orcid.org/0000-0001-5727-3673"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Srdjan Capkun","raw_affiliation_strings":["ETH Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038851181"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":1.3264,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.84490651,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8081315755844116},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6122331619262695},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.591515839099884},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5528313517570496},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.5052974820137024},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.4915097653865814},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4828389286994934},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.47105976939201355},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4086277186870575},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3748164176940918},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3032320737838745},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1011425256729126}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8081315755844116},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6122331619262695},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.591515839099884},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5528313517570496},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.5052974820137024},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.4915097653865814},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4828389286994934},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.47105976939201355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4086277186870575},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3748164176940918},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3032320737838745},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1011425256729126},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2420950.2420960","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2420950.2420960","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.723.1431","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.723.1431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://s3.eurecom.fr/docs/acsac12_masti.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G6535731676","display_name":null,"funder_award_id":"9080","funder_id":"https://openalex.org/F4320321942","funder_display_name":"Hasler Stiftung"},{"id":"https://openalex.org/G7661742624","display_name":null,"funder_award_id":"258754","funder_id":"https://openalex.org/F4320334960","funder_display_name":"Seventh Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320321942","display_name":"Hasler Stiftung","ror":"https://ror.org/04m3t9183"},{"id":"https://openalex.org/F4320334960","display_name":"Seventh Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W162878183","https://openalex.org/W1504046403","https://openalex.org/W1578616565","https://openalex.org/W1923325560","https://openalex.org/W1976837639","https://openalex.org/W1977042717","https://openalex.org/W2021362805","https://openalex.org/W2065911229","https://openalex.org/W2100638929","https://openalex.org/W2109488193","https://openalex.org/W2120746231","https://openalex.org/W2123684886","https://openalex.org/W2131069932","https://openalex.org/W2136310957","https://openalex.org/W2149256534","https://openalex.org/W2153256720","https://openalex.org/W2168226456","https://openalex.org/W2262960161","https://openalex.org/W2914982603"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W1967649051","https://openalex.org/W3036524962","https://openalex.org/W4240977217","https://openalex.org/W2508088450","https://openalex.org/W4214750239","https://openalex.org/W2389434635","https://openalex.org/W2279908259","https://openalex.org/W4252107351"],"abstract_inverted_index":{"The":[0],"growing":[1],"complexity":[2],"and":[3,8,44,57,94,126],"increased":[4],"networking":[5],"of":[6,16,63,89,128],"security":[7],"safety-critical":[9],"systems":[10],"expose":[11],"them":[12],"to":[13],"the":[14,32,50,54,82,87,124,137],"risk":[15],"adversarial":[17],"compromise":[18],"through":[19,131],"remote":[20],"attacks.":[21],"These":[22],"attacks":[23,118],"can":[24],"result":[25],"in":[26],"full":[27],"system":[28,39,73,93,99,108,130],"compromise,":[29],"but":[30,115],"often":[31],"attacker":[33],"gains":[34],"control":[35],"only":[36,111],"over":[37,45],"some":[38,46],"components":[40],"(e.g.,":[41],"a":[42,70,90,132],"peripheral)":[43],"applications":[47,65,114],"running":[48,68],"on":[49,59,69,136],"system.":[51],"We":[52,80,104,122],"consider":[53],"latter":[55],"scenario":[56],"focus":[58],"enabling":[60],"on-schedule":[61],"execution":[62],"critical":[64],"that":[66,100,106],"are":[67],"partially":[71],"compromised":[72,120],"---":[74],"we":[75,95],"call":[76],"this":[77],"trusted":[78,91],"scheduling.":[79],"identify":[81],"essential":[83],"properties":[84],"needed":[85],"for":[86],"realization":[88],"scheduling":[92],"design":[96],"an":[97],"embedded":[98],"achieves":[101],"these":[102],"properties.":[103],"show":[105],"our":[107,129],"protects":[109],"not":[110],"against":[112,117],"misbehaving":[113],"also":[116],"by":[119],"peripherals.":[121],"evaluate":[123],"feasibility":[125],"performance":[127],"prototype":[133],"implementation":[134],"based":[135],"AVR":[138],"ATmega103":[139],"microcontroller.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
