共 63 条
[32]
Miller C., 2014, Black Hat USA, V2014, P94
[33]
Miller C., 2015, Black Hat USA
[34]
Secure Control Against Replay Attacks
[J].
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2,
2009,
:911-918
[35]
Mohan S., 2013, P 2 ACM INT C HIGH C, P65
[36]
Real-Time Systems Security Through Scheduler Constraints
[J].
2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014),
2014,
:129-+
[37]
On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks
[J].
25TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2019),
2019,
:103-116
[38]
Park G, 2016, IEEE DECIS CONTR P, P5085, DOI 10.1109/CDC.2016.7799047
[39]
Pellizzoni R, 2015, 21ST IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2015), P271, DOI 10.1109/RTAS.2015.7108450
[40]
Petit J., 2015, BLACK HAT EUR, VVol. 11, P995