S Lab

[Sibin Mohan]

Systems Security Research Group at GWU and University of Illinois


Publications


    2023

  1. TOPr: Enhanced Static Code Pruning for Fast and Precise Directed Fuzzing” by Chaitra Niddodi, Stefan Nagy, Darko Marinov and Sibin Mohan. arXiv preprint arXiv:2309.09522, 2023.

  2. tagSystem Auditing for Real-Time Systems” by Ayoosh Bansal, Anant Kandiguppa, Monowar Hasan, Chien-Ying Chen Sibin Mohan. Accepted for publication in the ACM journal, Transactions on Security and Privacy (TOPS), 2023. [pdf]

  3. tagYou Can’t Always Check What You Wanted: Selective Checking and Trusted Execution to Prevent False Actuations in Real-Rime Internet-of-Things” by Monowar Hasan and Sibin Mohan. Published in the 26th IEEE International Symposium on Real-Time Distributed Computing (ISORC). [pdf]

  4. TAGIOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility” by Chaitra Niddodi, Ashish Gehani, Tanu Malik, Sibin Mohan and Mike Rilee. Published in the IEEE Access Journal, Vol. 11, 2023. [PDF]

  5. TAGSchedGuard++: Protecting against Schedule Leaks Using Linux Containers On Multicore Processors” by Jiyang Chen, Tomasz Kloda, Ayoosh Bansal, Rohan Tabish, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo and Lui Sha. Published in the Transactions on Cyber-Physical Systems (TCPS), 2023 (accepted in 2022). [PDF]

  6. 2022

  7. TAGTowards Efficient Auditing for Real-Time Systems” by Ayoosh Bansal, Anant Kandiguppa, Monowar Hasan, Chien-Ying Chen Sibin Mohan. Published in the 27th European Symposium on Research in Computer Security (ESORICS), Sept 2022. [PDF]

  8. TAGSet the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating” by Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan and Tianyin Xu. Published in the Communications of the ACM (CACM) Research Highlights, 2021. This is a "research highlight" version of our 2020 Sigmetrics Paper. [html] [PDF]

  9. TAGBeyond Just Safety: Delay-Aware Security Monitoring for Real-Time Control Systems” by Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni and Rakesh Bobba. Published in the ACM Transactions on Cyber-Physical Systems (TCPS), 2021. [PDF]

  10. TAGVerified Programs Can Party: Optimizing Kernel Extensions via Post-Verification In-Kernel Merging” by Hsuan-Chi Kuo, Kai-Hsun Chen, Yicheng Lu, Daniel Williams, Tianyin Xu and Sibin Mohan. Published in the 17th European Conference on Computer Systems (EuroSys 2022), April 2022. [PDF]

  11. 2021

  12. TAGIndistinguishability Prevents Scheduler Side-Channels in Real-Time Systems” by Chien-Ying Chen, Debopam Sanyal and Sibin Mohan. Published in the ACM Conference on Computer and Communications Security (CCS), November 2021. [PDF]

  13. TAG TAGPIRMedic: A Physics-based Fault Diagnosis for Passive Infra-Red (PIR) Sensors” by Ashish Kashinath, Sibin Mohan, Akshay Nambi and Sumukh Marathe. Published in the ACM International Conference on Systems for Energy-Efficient Buildings, Cities and Transportation (BuildSys ’21), November 2021. [PDF] [Talk Teaser Trailer] [Full Talk]

  14. TAGSchedGuard: Protecting against Schedule Leaks Using Linux Containers” by Jiyang Chen, Tomasz Kloda, Ayoosh Bansal, Rohan Tabish, Chien-Ying Chen, Bo Liu, Sibin Mohan, Marco Caccamo and Lui Sha. Published in the 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'21), May 2021. [PDF]

  15. TAGSafety Critical Networks using Commodity SDNs” by Ashish Kashinath, Monowar Hasan, Rakesh Kumar, Sibin Mohan, Rakesh Bobba and Smruti Padhy. Published in the IEEE International Conference on Computer Communications (INFOCOM), May 2021. [PDF][Talk]

  16. 2020

  17. TAGImproving Dependability via Deadline Guarantees in Commodity Real-time Networks” by Ashish Kashinath, Monowar Hasan, Sibin Mohan, Rakesh B Bobba and Radhika Mittal. Published in the IEEE International Workshop on Secure and Dependable Software-defined Networking for Sustainable Smart Communities (SecSDN'20), affiliated with the IEEE Global Communications Conference (GLOBECOM 2020). [PDF][Talk]

  18. TAGMiDas: Containerizing Data-Intensive Applications with I/O Specialization” by Chaitra Niddodi, Ashish Gehani, Tanu Malik, Jorge A. Navas and Sibin Mohan. Published in the 3rd International Workshop on Practical Reproducible Evaluation of Systems (P-RECS'20), affiliated with the 29th International Symposium on High-Performance Parallel and Distributed Computing (ACM HPDC 2020). [PDF] [Talk]

  19. TAGSet the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating” by Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan and Tianyin Xu. Published in the ACM SIGMETRICS conference, June 2020. [PDF] [Talk]

  20. TAGA Linux in Unikernel Clothing” by Hsuan-Chi Kuo, Daniel Williams, Ricardo Koller and Sibin Mohan. Published in the European Conference on Computer Systems (EuroSys), April 2020. [PDF] [Talk]

  21. TAGPeriod Adaptation for Continuous Security Monitoring in Multicore Systems” by Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni and Rakesh Bobba. Published in the Design, Automation and Test in Europe (DATE) conference, March 2020. [PDF]

  22. TAGSecurity Analysis against Spoofing Attacks for Distributed UAVs” by Kyo Kim, Siddharth Nalluri, Ashish Kashinath, Yu Wang, Sibin Mohan, Miroslav Pajic and Bo Li. Published in the NDSS Workshop on Decentralized IoT Systems and Security (NDSS DISS 2020). [PDF]

  23. 2019

  24. TAGSecuring Vehicle-to-Everything (V2X) Communication Platforms” by Monowar Hasan, Sibin Mohan, Takayuki Shimizu and Hongsheng Lu. Published in the IEEE Transactions on Intelligent Vehicles (TIV), 2020 [accepted 2019]. [PDF]

  25. TAGProtecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks” by Monowar Hasan and Sibin Mohan. Published in the ACM CCS Workshop on the Internet of Things Security and Privacy (IoT S&P), London, UK, November 2019. [PDF]

  26. TAGSecure Integration of Electric Vehicles with the Power Grid” by Chaitra Niddodi, Shanny Lin, Sibin Mohan and Hao Zhu. Published in the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), October 2019. [PDF]

  27. TAGA Unified Digital Twin Framework for Real-time Monitoring and Evaluation of Smart Manufacturing Systems” by Yassine Qamsane, Chien-Ying Chen, Efe C. Balta, Bin-Chou Kao, Sibin Mohan, James Moyne, Dawn Tilbury and Kira Barton. Published in the 15th IEEE International Conference on Automation Science and Engineering (CASE), Aug. 2019. [PDF]

  28. TAGTowards Automated Safety Vetting of PLC Code in Real-World Plants” by Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elain Shi, Sibin Mohan, Kira Barton, James Moyne and Z. Morley Mao. Published in in the Proceedings of the IEEE Symposium on Security & Privacy (S&P), May 2019. [PDF]

  29. TAGA Novel Side-Channel in Real-Time Scheduler” by C. Y. Chen, A. Ghassami, S. Mohan, R. Bobba, R. Pellizzoni and N. Kiyavash. Published in the IEEE conference Real-Time and Embedded Systems and Applications Symposium (RTAS), April 2019, Montreal, Canada. [PDF]

  30. 2018

  31. TAGPreserving Physical Safety Under Cyber Attacks” by F. Abdi, C. Y. Chen, M. Hasan, S. Mohan and M. Caccamo. Published in in the IEEE Internet-of-Things, Journal 2018. [PDF]

  32. TAGSecuring Real-Time Internet-of-Things” by C. Y. Chen, M. Hasan and S. Mohan. Accepted for publication in the SENSORS Journal, Special Issue on Design and Implementation of Future CPS, 2018. [PDF]

  33. TAGSpecial Session: The Future of IoT Security” by S. Mohan, M. Asplund, G. Bloom, A. Sadeghi, A. Ibrahim, N. Salajageh, P. Griffioen and B. Sinopoli. Published in the International Conference on Embedded Software (EMSOFT) 2018, Turin, Italy. [PDF]

  34. TAGGuaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems” by F. Abdi, C. Y. Chen, M. Hasan, S. Mohan and M. Caccamo. Published in the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) 2018, held in Porto, Portugal. [PDF]

  35. TAGSDCWorks: A Formal Framework for Software-Defined Control of Smart Manufacturing Systems” by M. Potok, C.Y. Chen, S. Mitra and S. Mohan. Published in the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) 2018, held in Porto, Portugal. [PDF]

  36. TAGScheduling, Isolation, and Cache Allocation: A Side-Channel Defense” by R. Sprabery, K. Evchenko, A. Raj, R. Bobba, S. Mohan and R. Campbell. Published in the IEEE International Conference on Cloud Engineering (IC2E), held in April 2018. [PDF]

  37. TAGA Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems” by M. Hasan, S. Mohan, R. Pellizzoni and R. Bobba. Published in the Design Automation and Test in Europe (DATE) conference, held in March 2018. [PDF]

  38. 2017

  39. TAGEnd-to-End Network Delay Guarantees for Real-Time Systems using SDN” by R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan and R. Bobba. Published in the IEEE Real-Time Systems Symposium (RTSS), held in December 2017. [PDF]

  40. TAGNew Directions for Container Debloating” by Vaibhav Rastogi, Chaitra Niddodi, Somesh Jha and Sibin Mohan. Published in the 2017 Workshop on Forming an Ecosystem Around Software Transformation (FEAST'17), affiliated with the 2017 ACM Conference on Computer and Communications Security (CCS 2017). Dallas, November 2017. [PDF]

  41. TAGContego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems” by M. Hasan, S. Mohan, R. Bobba and R. Pellizzoni. Published in the EUROMICRO Conference on Real-Time Systems (ECRTS), June 2017. [PDF]

  42. TAGDependable End-to-End Delay Constraints for Real-Time Systems using SDN” by Rakesh Kumar, Monowar Hasan, Smruti Padhy, Konstantin Evchenko, Lavanya Piramanayagam, Sibin Mohan and Rakesh Bobba. Published in the ECRTS Workshop on Real-Time Networks (RTN), Dubrovnik, Croatia, June 2017. [PDF]

  43. TAGSecuring Electric Vehicles in the Power Grid” by Chaitra Niddodi, Sibin Mohan and Tim Yardley. Published in the Work in Progress session of EUROMICRO Conference on Real-Time Systems (ECRTS), Dubrovnik, Croatia, June 2017. [PDF]

  44. TAGLearning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System” by M. K. Yoon, S. Mohan, J. Choi, M. Christodorescu and L. Sha. Published in the ACM/IEEE International Conference on Internet-Of-Things Design and Implementation (IoTDI), April 2017. [PDF]

  45. 2016

  46. TAGIntegrating Security Constraints into Fixed-Priority Real-Time Systems” by S. Mohan, M. K. Yoon, R. Pellizzoni and R. Bobba. Real-Time Systems (RTS) Journal, 52(5): 644-674, 2016. [PDF]

  47. TAG TAGExploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems” by M. Hasan, S. Mohan, R. Bobba and R. Pellizzoni. Published in the IEEE Real-Time Systems Symposium (RTSS), December 2016. [PDF]

  48. TAGScheduLeak: An Algorithm for Reconstructing Task Schedules in Fixed-Priority Hard Real-Time Systems” by Chien-Ying Chen, Amiremmad Ghassami, Sibin Mohan, Negar Kiyavash, Rakesh Bobba and Rofoldo Pellizzoni. Published in the IEEE RTSS Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Porto, Portugal, Nov. 2016. [PDF]

  49. TAGReSecure: A Restart-Base Security Protocol for Tightly Actuated Hard Real-Time Systems” by Fardin Abdi, Monowar Hasan, Sibin Mohan, Disha Agarwala and Marco Caccamo. Published in the IEEE RTSS Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Porto, Portugal, Nov. 2016. [PDF]

  50. TAGA Server Model to Integrate Security Tasks into Fixed-Priority Real-Time Systems” by Monowar Hasan, Sibin Mohan, Rakesh Bobba and Rodolfo Pellizzoni. Published in the IEEE RTSS Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS), Porto, Portugal, Nov. 2016. [PDF]

  51. TAGThe DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection” by Man-Ki Yoon, Mihai Christodorescu, Lui Sha and Sibin Mohan. Published in the ACM International Systems and Storage Conference (SYSTOR), June 2016. [PDF]

  52. TAGTaskShuffler: A Schedule Randomization Protocol for Obfuscation Against Timing Inference Attacks in Real-Time Systems” by Man-Ki Yoon, Sibin Mohan, Chien-Ying Chen and Lui Sha. Published in the IEEE conference Real-Time and Embedded Systems and Applications Symposium (RTAS), April 2016. [PDF]

  53. 2015

  54. TAGInter-Flow Consistency: A Novel SDN Update Abstraction for Supporting Inter-Flow Constraints” by W. Liu, R. Bobba, S. Mohan and R. Campbell. Published in the IEEE Conference on Communications and Network Security (CNS), Florence, Italy in September 2015. [PDF]

  55. TAGMemory Heat Map: Anomaly Detection in Real-Time Systems using Memory Behavior” by M. K. Yoon, S. Mohan, J. Choi, J. E. Kim and L. Sha. Published in the Design Automation Conference (DAC), June 2015. [PDF]

  56. TAGA Generalized Model for Preventing Information Leakage in Hard Real-Time Systems” by R. Pellizzoni, N. Paryab, M. K. Yoon, S. Bak, S. Mohan and R. Bobba. Published in the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS) in Seattle 2015. [PDF]

  57. TAGInter-Flow Consistency: Novel SDN Update Abstractions for Supporting Inter-Flow Constraints” by Weijie Liu, Rakesh Bobba, Sibin Mohan and Roy Campbell. Published in the NDSS Workshop on Security of Emerging Network Technologies (SENT), San Diego, February 2015. [PDF]

  58. 2014

  59. TAGIntrusion Detection for CPS Real-Time Controllers” by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan. Published in the Springler-Verlag book Cyber Physical Systems Approach to Smart Electric Power Grid book series: Understanding Complex Systems in November 2014. [PDF]

  60. TAGReal-Time Systems Security Through Scheduler Constraints” by S. Mohan, M. K. Yoon, R. Pellizzoni and R. Bobba published in the 26th EUROMICRO Conference on Real-Time Systems (ECRTS), Madrid, Spain, 2014. [PDF]

  61. 2013

  62. TAGOn-Chip Control Flow Integrity Check for Real Time Embedded ystems” by F. A. T. Abad, J. V. D. Woude, Y. Lu, S. Bak, M. Caccamo, L. Sha, R. Mancuso and S. Mohan published in the 1st IEEE International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), 2013. [PDF]

  63. TAGSecureCore: A Multicore Architecture or Intrusion Detection in Real-Time Control Systems” by M. K. Yoon, S. Mohan, J. Choi, J. E. Kim and L. Sha published in the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS), Philadelphia, Pennsylvania in April 2013. [PDF]

  64. TAGS3A: Secure System Simplex Architecture for Safety-Critical Supervisory Control Systems” by S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha and M. Caccamo submitted to published in the 2nd ACM Conference on High Confidence Networked Systems (HiCoNS), Philadelphia, Pennsylvania in April 2013. [PDF]

  65. Older Papers

  66. TAGParametric Timing Analysis and its Application to DVS” by S. Mohan and F. Mueller. Published in the ACM Journal Transactions in Embedded Computing Systems (TECS), Vol. 10, No. 2, Dec. 2010 (accepted 2007). [PDF]

  67. TAGExploring the Design Space of IMA System Architectures” by R. Bradford, S. Mohan, M. Nam, R. Pellizzoni, L. Sha and S. Fliginger published in the 29th Digital Avionics Systems Conference (DASC), 2010. [PDF]

  68. TAGAnytime Algorithms for Multicore Processors” by A. Saba, S. Mohan and R. Mangharam. Published in the Work in Progress session at ECRTS, Brussels, Belgium in July 2010. [PDF]

  69. TAGTime-Based Intrusion Detection in Cyber-Physical Systems” by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan published in the ACM/IEEE ICCPS conference, 2010. [PDF]

  70. TAGA Framework for the Safe Interoperability of Medical Devices in the Presence of Connection Failures” by C. Kim, M. Sun, S. Mohan, H. Yun, A. Nayeem and L. Sha published in ACM/IEEE ICCPS 2010. [PDF]

  71. TAGRapid Early-Phase Virtual Integration” by S. Mohan, M. Nam, R. Pellizzoni, L. Sha, R. Bradford and S. Fliginger submitted to published in the IEEE Real-time Systems Symposium (RTSS), 2009. [PDF]

  72. TAGCheckerCore: Enhancing an FPGA Soft Core to Capture Worst-Case Execution Times” by J. Ouyang, R. Raghavendra, S. Mohan, Y. Xie and F. Mueller published in CASES 2009. [PDF]

  73. TAGPush-Assisted Migration of Real-Time Tasks in Multi-Core Processors” by A. Sarkar, F. Mueller, H. Ramaprasad and S. Mohan in LCTES 2009. [PDF]

  74. TAGTime-Based Intrusion Detection in Cyber-Physical Systems” by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan. Published in the Work in Progress session at IEEE RTSS Conference, Washington, DC, Dec. 2009. [PDF]

  75. TAGAddressing Safety and Security Contradictions in Cyber-Physical Systems” by Mu Sun, Sibin Mohan, Lui Sha and Carl Gunter. Published in the Fourth Workshop on Embedded Systems Security (WESS), October 2009. [PDF]

  76. TAGIntegrating Security into Real-Time Systems using Temporal Constraints” by Chris Zimmer, Frank Mueller and Sibin Mohan. Published in the Fourth Workshop on Embedded Systems Security (WESS), October 2009. [PDF]

  77. TAGAddressing Safety and Security Contradictions in Cyber-Physical Systems” by Mu Sun, Sibin Mohan, Lui Sha and Carl Gunter. Published in the First Workshop on Future Directions in Cyber-Physical Systems, July 2009. [PDF]

  78. TAGTime-Based Intrusion Detection in Cyber-Physical Systems” by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan. Published in the Work in Progress session at EUROMICRO Conference on Real-Time Systems (ECRTS), Dublin, Ireland, July 2009. [PDF]

  79. TAGMerging State and Preserving Timing Anomalies in Pipelines of High-End Processors” by S. Mohan and F. Mueller in the IEEE Real-time Systems Symposium (RTSS) 2008. [PDF]

  80. TAGHybrid Timing Analysis of Modern Processor Pipeline via Hardware/Software Interactions” by S. Mohan and F. Mueller in the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS), 2008. [PDF]

  81. TAGTemporal Analysis for Adapting Concurrent Applications to Embedded Systems” by S. Mohan and J. Helander in EUROMICRO Conference on Real-Time Systems (ECRTS), 2008. [PDF]

  82. TAGBuiling Robust Automotive Systems through Separation of Concerns” by Sibin Mohan and Johannes Helander. Published in the National Workshop on High-Confidence Automotive Cyber-Physical Systems, April 2008. [PDF]

  83. TAGWorst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems” by Sibin Mohan. Published in the PhD student forum in IEEE RTSS 2007. Published in ACM SIGBED Review Vol 5, Number 1 -- Special issue on the RTSS Forum on Deeply Embedded Real-Time Computing, January 2008. [PDF]

  84. TAGCheckerMode: A Hybrid Scheme for Timing Analysis of Modern Processor Pipelines Involving Hardware/Software Interactions” by Sibin Mohan and Frank Mueller. Published in the Work-in-Progress Session at the IEEE Conference on Real-Time and Embedded Applications Symposium (RTAS), Seattle, Aptil 2007. [PDF]

  85. TAGParaScale: Exploiting Parametric Timing Analysis for Real-Time Schedulers and Dynamic Voltage Scaling” by S. Mohan, F. Mueller, W, Hawkins, M. Root, C. Healy and D. Whalley in the IEEE Real-time Systems Symposium (RTSS) 2005. [PDF]

  86. TAGTiming Analysis for Sensor Network Nodes of the Atmega Processor Family” by S. Mohan, F. Mueller, D. Whalley and C. Healy in the the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS), 2005. [PDF]

Technical Reports

  1. REORDER: Securing Dynamic-Priority Real-Time Systems Using Schedule Obfuscation” by C.-Y. Chen, M. Hasan, A. Ghassami, S. Mohan, N. Kiyavash [Link]

  2. Learning Execution Contexts rom System Call Distributions for Intrusion Detection in Embedded Systems” by M. K. Yoon, S. Mohan, J. Choi, M. Christodorescu and L. Sha. ArXiv Computing Research Repository (CoRR), 2015 (arXiv:1501.05963 [cs.CR]).

  3. S3A: Secure System Sipmlex Architecture for Safety-Critical Supervisory Control Systems” by S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha and M. Caccamo; ArXiv Computing Research Repository (CoRR), 2012 (arXiv:1202.5722 [cs.CR]).

  4. Preserving Timing Anomalies in Pipelines of High-End Processors” by S. Mohan and F. Mueller; North Carolina State University Dept. of Computer Science Technical Report, ab

  5. Temoral Analysis for Adapting Concurrent Applications to Embedded Systems” by S. Mohan and J. Helander; Microsoft Research Technical Report (MSR-TR-2008-37) 2008.

  6. Embbeded Systems Research at DemoFest 2007” by O. Almeida, A. Forin, P. Garcia, J. Helander, N. Khantal, H. Lu, K. Meier, S. Mohan, H. Nielsen, R. Pittman, R. Serg, B. Sukhwani, M. Veanes, B. Zorn, S. Berry, C. Boyce, D. Chaszar, B. Culrich, M. Khisin, G. Knezeck, W. Linam-Church, S. Liu, M. Stewart and D. Toney; Microsoft Research Technical Report (MSR-TR-2007-94) 2007.

Dissertations and Thesis

  1. Integrating Security into Real-Time Cyber-Physical Systems” by Monowar Hasan. Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2020. [PDF]

  2. Scheduler Side-Channels in Preemptive Real-Time Systems: Attack and Defense Techniques” by Chien-Ying Chen. Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2020. [PDF]

  3. Preserving Safety in Distributed Cyber Physical Systems with Unreliable Communication Channels” by Fardin Abdi Taghi Abad. Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2019. [PDF]

  4. Software-Defined Wide-Area Networks for Distributed Microgrid Power Systems” by XuanYao Zhang. M.S. Thesis, University of Illinois at Urbana-Champaign, 2018. [PDF]

  5. Application of Deep Learning for Predicting Schedules in Real-Time Systems” by Kyo-Hyun Kim. M.S. Thesis, University of Illinois at Urbana-Champaign, 2018. [PDF]

  6. Secure Integration of Electric Vehicles with the Power Grid” by Chaitra Prasad Niddodi. M.S. Thesis, University of Illinois at Urbana-Champaign, 2018. [PDF]

  7. Secure and dependable cyber-physical system architectures” by Man-Ki Yoon. Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2017. [PDF]

  8. Exploiting Hardware/Software Interactions for Analyzing Embedded Systems” by Sibin Mohan. Ph.D. Dissertation, North Carolina State University, 2008. [PDF]