{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:04:44Z","timestamp":1762272284651,"version":"build-2065373602"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342007","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"225-230","source":"Crossref","is-referenced-by-count":24,"title":["A design-space exploration for allocating security tasks in multicore real-time systems"],"prefix":"10.23919","author":[{"given":"Monowar","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Sibin","family":"Mohan","sequence":"additional","affiliation":[]},{"given":"Rodolfo","family":"Pellizzoni","sequence":"additional","affiliation":[]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"123","article-title":"Exploring opportunistic execution for integrating security into legacy hard realtime systems","author":"hasan","year":"2016","journal-title":"IEEE RTSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-016-9252-5"},{"key":"ref12","first-page":"21","article-title":"SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems","author":"yoon","year":"2013","journal-title":"IEEE RTAS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1978802.1978814"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2005.40"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0034"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.271"},{"key":"ref18","first-page":"1170","article-title":"QoS negotiation in realtime systems and its application to automated flight control","volume":"49","author":"atdelzater","year":"2000","journal-title":"IEEE TC"},{"journal-title":"Xenomai &#x2014; real-time framework for Linux","year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11081-007-9001-7"},{"journal-title":"Tripwire","year":"0","key":"ref4"},{"key":"ref27","first-page":"47","article-title":"ReSecure: A restart-based security protocol for tightly actuated hard real-time systems","author":"abdi","year":"2016","journal-title":"IEEE CERTS"},{"key":"ref3","article-title":"Analysis of the cyber attack on the ukrainian power grid","author":"lee","year":"2016","journal-title":"SANS Industrial Control Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1275986.1275992"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"journal-title":"The Bro Network Security Monitor","year":"0","key":"ref5"},{"key":"ref8","article-title":"Design optimization of security-sensitive mixed-criticality real-time embedded systems","author":"zhang","year":"2013","journal-title":"IEEE ReTiMiCS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2014055"},{"key":"ref2","first-page":"6","article-title":"W32. stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2013.355"},{"journal-title":"Future of the Internet of things in mission critical applications","year":"2016","author":"westling","key":"ref1"},{"journal-title":"GPkit software for geometric programming","year":"2017","author":"burnell","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2739954"},{"journal-title":"The CVXOPT Linear and Quadratic Cone Program Solvers","year":"2010","author":"vandenberghe","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2008.45"},{"key":"ref23","first-page":"6","article-title":"Techniques for the synthesis of multiprocessor tasksets","author":"emberson","year":"2010","journal-title":"Watershed"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6926003"},{"key":"ref25","first-page":"278","article-title":"Period optimization for hard real-time distributed automotive systems","author":"davare","year":"2007","journal-title":"ACM DAC"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342007.pdf?arnumber=8342007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T11:11:05Z","timestamp":1525432265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342007","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}