{"id":"https://openalex.org/W2757117954","doi":"https://doi.org/10.1145/3126518","title":"Security-Aware Scheduling of Embedded Control Tasks","display_name":"Security-Aware Scheduling of Embedded Control Tasks","publication_year":2017,"publication_date":"2017-09-27","ids":{"openalex":"https://openalex.org/W2757117954","doi":"https://doi.org/10.1145/3126518","mag":"2757117954"},"language":"en","primary_location":{"id":"doi:10.1145/3126518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3126518","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056221012","display_name":"Vuk Lesi","orcid":"https://orcid.org/0000-0002-6804-4400"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vuk Lesi","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034669051","display_name":"Ilija Jovanov","orcid":"https://orcid.org/0000-0001-9771-8155"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ilija Jovanov","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086742584","display_name":"Miroslav Paji\u0107","orcid":"https://orcid.org/0000-0002-5357-0117"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Miroslav Pajic","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056221012"],"corresponding_institution_ids":["https://openalex.org/I170897317"],"apc_list":null,"apc_paid":null,"fwci":4.9569,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.96701988,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"16","issue":"5s","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9028540253639221},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5890707969665527},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4790855050086975},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43436428904533386},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43287914991378784},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.42179766297340393}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9028540253639221},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5890707969665527},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4790855050086975},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43436428904533386},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43287914991378784},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.42179766297340393},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3126518","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3126518","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G7082253505","display_name":null,"funder_award_id":"N00014-17-1-2012, N00014-17-1-2504","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G813590460","display_name":null,"funder_award_id":"CNS-1652544, CNS-1505701","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W87635799","https://openalex.org/W1542253002","https://openalex.org/W1566191317","https://openalex.org/W1921864689","https://openalex.org/W1995810576","https://openalex.org/W2034751786","https://openalex.org/W2086748818","https://openalex.org/W2100257697","https://openalex.org/W2103707436","https://openalex.org/W2107043025","https://openalex.org/W2110342729","https://openalex.org/W2111990577","https://openalex.org/W2119358936","https://openalex.org/W2119597710","https://openalex.org/W2133461006","https://openalex.org/W2137784941","https://openalex.org/W2142993476","https://openalex.org/W2156340783","https://openalex.org/W2166140035","https://openalex.org/W2170091282","https://openalex.org/W2196434470","https://openalex.org/W2336945163","https://openalex.org/W2345492474","https://openalex.org/W2516521254","https://openalex.org/W2528938905","https://openalex.org/W2531237237","https://openalex.org/W2734583939","https://openalex.org/W2783686098","https://openalex.org/W2787198440","https://openalex.org/W2964114015","https://openalex.org/W3100571116","https://openalex.org/W4210448211","https://openalex.org/W4240021637","https://openalex.org/W4253448496"],"related_works":["https://openalex.org/W2901729341","https://openalex.org/W2148952798","https://openalex.org/W3166545041","https://openalex.org/W2505244523","https://openalex.org/W4246289931","https://openalex.org/W2952348651","https://openalex.org/W2111375262","https://openalex.org/W2770657926","https://openalex.org/W2372156812","https://openalex.org/W1991205173"],"abstract_inverted_index":{"In":[0],"this":[1,38,60,159],"work,":[2],"we":[3,74,99,161,184,217],"focus":[4],"on":[5,43,83,149,158,223],"securing":[6],"cyber-physical":[7],"systems":[8],"(CPS)":[9],"in":[10,69,107],"the":[11,44,76,108,139,142,196,212],"presence":[12,109],"of":[13,40,46,78,92,110,141,152,220],"network-based":[14],"attacks,":[15,20],"such":[16,49],"as":[17,50],"Man-in-the-Middle":[18],"(MitM)":[19],"where":[21],"a":[22,84,89,163,170,186,206,224],"stealthy":[23],"attacker":[24],"is":[25],"able":[26],"to":[27,55,101,168,179,188,204],"compromise":[28],"communication":[29],"between":[30,191],"system":[31],"sensors":[32],"and":[33,155,195,201],"controllers.":[34],"Standard":[35],"methods":[36],"for":[37,117,123,138],"type":[39],"attacks":[41],"rely":[42],"use":[45,68],"cryptographic":[47],"mechanisms,":[48],"Message":[51],"Authentication":[52],"Codes":[53],"(MACs)":[54],"ensure":[56],"data":[57,134],"integrity.":[58],"However,":[59],"approach":[61,222],"incurs":[62],"significant":[63],"computation":[64,146],"overhead,":[65],"limiting":[66],"its":[67],"resource":[70,182],"constrained":[71],"systems.":[72],"Consequently,":[73],"consider":[75],"problem":[77],"scheduling":[79],"multiple":[80,228],"control":[81,102,125,130,153,230],"tasks":[82,126,154],"shared":[85],"processor":[86],"while":[87],"providing":[88],"suitable":[90],"level":[91],"security":[93,97],"guarantees.":[94,215],"Specifically,":[95],"by":[96,114],"guarantees":[98],"refer":[100],"performance,":[103],"i.e.,":[104],"Quality-of-Control":[105],"(QoC),":[106],"attacks.":[111],"We":[112],"start":[113],"mapping":[115],"requirements":[116],"QoC":[118,176,198,214],"under":[119,199],"attack":[120],"into":[121],"constraints":[122],"security-aware":[124],"that,":[127],"besides":[128],"standard":[129],"operations,":[131],"intermittently":[132],"perform":[133],"authentication.":[135],"This":[136],"allows":[137],"analysis":[140],"impact":[143],"that":[144,210],"security-related":[145],"overhead":[147],"has":[148],"both":[150],"schedulability":[151],"QoC.":[156],"Building":[157],"analysis,":[160],"introduce":[162],"mixed-integer":[164],"linear":[165],"programming-based":[166],"technique":[167],"obtain":[169,205],"schedulable":[171,207],"task":[172,208],"set":[173,209],"with":[174,227],"predefined":[175],"requirements.":[177],"Also,":[178],"facilitate":[180],"optimal":[181],"allocation,":[183],"provide":[185],"method":[187],"analyze":[189],"interplay":[190],"available":[192],"computational":[193],"resources":[194],"overall":[197,213],"attack,":[200],"show":[202],"how":[203],"maximizes":[211],"Finally,":[216],"prove":[218],"usability":[219],"our":[221],"case":[225],"study":[226],"automotive":[229],"components.":[231]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
