Menu

About Me     Research     CV     Publications         Professional     Personal


Publications List.

Journal Publications

  1. Integrating Security Constraints into Fixed-Priority Real-Time Systems by S. Mohan, M. K. Yoon, R. Pellizzoni and R. Bobba. Real-Time Systems (RTS) Journal, 52(5): 644-674.
  2. Intrusion Detection for CPS Real-Time Controllers by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan. Published in the Springler-Verlag book Cyber Physical Systems  Approach to Smart Electric Power Grid book series: Understanding Complex Systems in November 2014.
  3. [pdf] Parametric Timing Analysis and its Application to DVS by S. Mohan and F. Mueller. Published in the ACM Journal Transactions in Embedded Computing Systems (TECS), Vol. 10, No. 2, Dec. 2010 (accepted 2007).

In submission:

  1. Integrating Security and Mode Changes in Real-Time Systems by M. Hasan, S. Mohan, R. Pellizzoni and R. Bobba. Submitted to the IEEE Transactions in Computing (TC), 2017.
  2. Inter-flow Consistency in SDN Network Updates: Abstractions and Optimizations by S. Padhy, K. Evchenko, W. Liu, R. Bobba, S. Mohan and R. Campbell. Submitted to the IEEE Transactions on Depdendable and Secure Computing (TDSC), 2017.

Conference Publications

  1. Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems by F. Abdi, C. Y. Chen, M. Hasan, S. Mohan and M. Caccamo. Accepted for publication in the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) 2018, to be held in Porto, Portugal.
  2. SDCWorks: A Formal Framework for Software-Defined Control of Smart Manufacturing Systems by M. Potok, C.Y. Chen, S. Mitra and S. Mohan. Accepted for publication in the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS) 2018, to be held in Porto, Portugal.
  3. Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense by R. Sprabery, K. Evchenko, A. Raj, R. Bobba, S. Mohan and R. Campbell. Accepted for publication in the IEEE International Conference on Cloud Engineering (IC2E), to be held in April 2018.
  4. A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems by M. Hasan, S. Mohan, R. Pellizzoni and R. Bobba. Accepted for publication in the Design Automation and Test in Europe (DATE) conference, to be held in March 2018.
  5. End-to-End Network Delay Guarantees for Real-Time Systems using SDN by R. Kumar, M. Hassan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan and R. Bobba. Accepted for publication in the IEEE Real-Time Systems Symposium (RTSS), to be held in December 2017. 

  6. Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems by M. Hassan, S. Mohan, R. Bobba and R. Pellizzoni. Published in the EUROMICRO Conference on Real-Time Systems (ECRTS), June 2017. 

  7. Learning Execution Contexts from System Call Distribution for Anomaly Detection in Smart Embedded System by M. K. Yoon, S. Mohan, J. Choi, M. Christodorescu and L. Sha. Published in the ACM/IEEE International Conference on Internet-Of-Things Design and Implementation (IoTDI), April 2017.
  8. Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems by M. Hassan, S. Mohan, R. Bobba and R. Pellizzoni. Published in the IEEE Real-Time Systems Symposium (RTSS), December 2016. Best Student Paper Award. 

  9. The DragonBeam Framework: Hardware-Protected Security Modules for In-Place Intrusion Detection by M. K. Yoon, M. Christodorescu, L. Sha and S. Mohan. Published in the ACM International Systems and Storage Conference (SYSTOR), June 2016.
  10. TaskShuffler: A Schedule Randomization Protocol for Obfuscation Against Timing Infer- ence Attacks in Real-Time Systems by M. K. Yoon, S. Mohan, C. Y. Chen and L. Sha. Published in the IEEE conference Real-Time and Embedded Systems and Applications Symposium (RTAS), April 2016.
  11. Inter-Flow Consistency: A Novel SDN Update Abstraction for Supporting Inter-Flow Constraints by W. Liu, R. Bobba, S. Mohan and R. Campbell. Accepted for publication in the IEEE Conference on Communications and Network Security (CNS) to be held in Florence, Italy in September 2013.
  12. Memory Heat Map: Anomaly Detection in Real-Time Systems using Memory Behavior by M. K. Yoon, S. Mohan, J. Choi, J. E. Kim and L. Sha published in the Design Automation Conference (DAC), June 2015.
  13. A Generalized Model for Preventing Information Leakage in Hard Real-Time Systems by R. Pellizzoni, N. Paryab, M. K. Yoon, S. Bak, S. Mohan and R. Bobba published in the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS) in Seattle 2015.
  14. Real-Time Systems Security Through Scheduler Constraints by S. Mohan, M. K. Yoon, R. Pellizzoni and R. Bobba published in the 26th EUROMICRO Conference on Real-Time Systems (ECRTS), Madrid, Spain, 2014.
  15. On-chip control flow integrity check for real time embedded systems by F. A. T. Abad, J. V. D. Woude, Y. Lu, S. Bak, M. Caccamo, L. Sha, R. Mancuso and S. Mohan published in the 1st IEEE International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA), 2013.
  16. SecureCore: A Multicore Architecture for Intrusion Detection in Real-Time Control Systems by M. K. Yoon, S. Mohan, J. Choi, J. E. Kim and L. Sha submitted to published in the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS), Philadelphia, Pennsylvania in April 2013.
  17. S3A: Secure System Simplex Architecture for Safety-Critical Supervisory Control Systems by S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha and M. Caccamo submitted to published in the 2nd ACM Conference on High Confidence Networked Systems (HiCoNS), Philadelphia, Pennsylvania in April 2013.
  18. [pdf] Exploring the Design Space of IMA System Architectures by R. Bradford, S. Mohan, M. Nam, R. Pellizzoni, L. Sha and S. Fliginger published in the 29th Digital Avionics Systems Conference (DASC), 2010.
  19. [pdf] Time-Based Intrusion Detection in Cyber-Physical Systems by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan accepted for publication published in ACM/IEEE ICCPS 2010.
  20. [pdf] A Framework for the Safe Interoperability of Medical Devices in the Presence of Connection Failures by C. Kim, M. Sun, S. Mohan, H. Yun, A. Nayeem and L. Sha accepted for publication published in ACM/IEEE ICCPS 2010.
  21. [pdf] Rapid Early-Phase Virtual Integration by S. Mohan, M. Nam, R. Pellizzoni, L. Sha, R. Bradford and S. Fliginger submitted to published in the IEEE Real-time Systems Symposium (RTSS), 2009.
  22. [pdf] CheckerCore: Enhancing an FPGA Soft Core to Capture Worst-Case Execution Times by J. Ouyang, R. Raghavendra, S. Mohan, Y. Xie and F. Mueller accepted for publication published in CASES 2009.
  23. [pdf] Push-Assisted Migration of Real-Time Tasks in Multi-Core Processors by A. Sarkar, F. Mueller, H. Ramaprasad and S. Mohan in LCTES 2009.
  24. [pdf] Merging State and Preserving Timing Anomalies in Pipelines of High-End Processors by S. Mohan and F. Mueller in the IEEE Real-time Systems Symposium (RTSS) 2008.
  25. [pdf] Hybrid Timing Analysis of Modern Processor Pipeline via Hardware/Software Interactions by S. Mohan and F. Mueller in the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS), 2008.
  26. [pdf] Temporal Analysis for Adapting Concurrent Applications to Embedded Systems by S. Mohan and J. Helander in EUROMICRO Conference on Real-Time Systems (ECRTS), 2008.
  27. [pdf] ParaScale: Exploiting Parametric Timing Analysis for Real-Time Schedulers and Dynamic Voltage Scaling by S. Mohan, F. Mueller, W, Hawkins, M. Root, C. Healy and D. Whalley in the IEEE Real-time Systems Symposium (RTSS) 2005.
  28. [pdf] Timing Analysis for Sensor Network Nodes of the Atmega Processor Family by S. Mohan, F. Mueller, D. Whalley and C. Healy in the  the IEEE Conference on Real-Time and Embedded Technology and Applications Symposium (RTAS), 2005.

Workshop Publications

  1. New Directions for Container Debloating by V. Rastogi, C. Niddodi, S. Jha and S. Mo- han. Published in the ACM CCS Workshop on Forming an Ecosystem around Software Transformation (FEAST) (RTN) held in Dallas, November 2017.
  2. Dependable End-to-End Delay Constraints for Real-Time Systems using SDN by R. Kumar, M. Hasan, S. Padhy, K. Evchenko, L. Piramanayagam, S. Mohan and R. Bobba. Published in the ECRTS Workshop on Real-Time Networks (RTN) held in Dubrovnik, Croatia, June 2017.
  3. Securing Electric Vehicles in the Power Grid by C. Niddodi,, S. Mohan and T. Yardley. Published in the Work in Progress session of EUROMICRO Conference on Real-Time Systems (ECRTS) held in Dubrovnik, Croatia, June 2017.
  4. ScheduLeak: An Algorithm for Reconstructing Task Schedules in Fixed-Priority Hard Real-Time Systems by C.Y. Chen, A. Ghassami, S. Mohan, N. Kiyavash, R. Bobba and R. Pellizzoni. Published in the IEEE RTSS Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS) held in Porto, Portugal, Nov. 2016.
  5. ReSecure: A Restart-Based Security Protocol for Tightly Actuated Hard Real-Time Systems by F. Abdi, C.Y. Chen, M. Hasan, S. Mohan, D. Agarwal and M. Caccamo. Published in the IEEE RTSS Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS) held in Porto, Portugal, Nov. 2016.
  6. A Server Model to Integrate Security Tasks into Fixed-Priority Real-Time Systems by M. Hasan, S. Mohan R. Bobba and R. Pellizzoni. Published in the IEEE RTSS Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS) held in Porto, Portugal, Nov. 2016.
  7. Inter-Flow Consistency: Novel SDN Update Abstractions for Supporting Inter-Flow Constraints by W. Liu, R. Bobba, S. Mohan and R. Campbell published in the NDSS Workshop on Security of Emerging Network Technologies (SENT) in San Diego in February 2015.
  8. Anytime Algorithms for Multicore Processors by A. Saba, S. Mohan and R. Mangharam accepted for publication in the Work in Progress session at ECRTS to be held in Brussels, Belgium in July 2010.
  9. Time-Based Intrusion Detection in Cyber-Physical Systems by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan published in the Work in Progress session at the IEEE RTSS Conference held in Washington, DC in Dec. 2009.
  10. Addressing Safety and Security Contradictions in Cyber-Physical Systems by M. Sun, S. Mohan, L. Sha and C. Gunter submitted to the Fourth Workshop on Embedded Systems Security (WESS) to be held as part of ESWeek in Oct. 2009.
  11. Integrating Security into Real-Time Systems using Temporal Constraints by C. Zimmer, F. Mueller and S. Mohan submitted to the Fourth Workshop on Embedded Systems Security (WESS) to be held as part of ESWeek in Oct. 2009.
  12. Addressing Safety and Security Contradictions in Cyber-Physical Systems by M. Sun, S. Mohan, L. Sha and C. Gunter. Position Paper. Published/presented at the First Workshop on Future Directions in Cyber-Physical Systems held in July 2009. This is a by-invitation only workshop.
  13. Time-Based Intrusion Detection in Cyber-Physical Systems by C. Zimmer, B. Bhatt, F. Mueller and S. Mohan published in the Work in Progress session at the EUROMICRO Conference on Real-Time Systems (ECRTS) held in Dublin, Ireland in July 2009.
  14. Building Robust Automotive Systems through Separation of Concerns by S. Mohan and J. Helander. Position paper at the National Workshop on High-Confidence Automotive Cyber-Physical Systems, April 2008. This is a by-invitation only workshop.
  15. Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems by S. Mohan at the PhD student forum in IEEE RTSS 2007. Published in ACM SIGBED Review Vol 5, Number 1 -- Special issue on the RTSS Forum on Deeply Embedded Real-Time Computing, January 2008.
  16. CheckerMode: A Hybrid Scheme for Timing Analysis of Modern Processor Pipelines Involving Hardware/Software Interactions by S. Mohan and F. Mueller in IEEE RTAS WIP 2007.

Technical Reports

  1. Learning Execution Contexts from System Call Distributions for Intrusion Detection in Embedded Systems by M. K. Yoon, S. Mohan, J. Choi, M. Christodorescu and L. Sha. ArXiv Computing Research Repository (CoRR), 2015 (arXiv:1501.05963 [cs.CR]).
  2. S3A: Secure System Simplex Architecture for Safety-Critical Supervisory Control Systems by S. Mohan, S. Bak, E. Betti, H. Yun, L. Sha and M. Caccamo; ArXiv Computing Research Repository (CoRR), 2012 (arXiv:1202.5722 [cs.CR]).
  3. Preserving Timing Anomalies in Pipelines of High-End Processors by S. Mohan and F. Mueller; North Carolina State University Dept. of Computer Science Technical Report, ab
  4. Temporal Analysis for Adapting Concurrent Applications to Embedded Systems by S. Mohan and J. Helander; Microsoft Research Technical Report (MSR-TR-2008-37) 2008.
  5. Embedded Systems Research at DemoFest 2007by O. Almeida, A. Forin, P. Garcia, J. Helander, N. Khantal, H. Lu, K. Meier, S. Mohan, H. Nielsen, R. Pittman, R. Serg, B. Sukhwani, M. Veanes, B. Zorn, S. Berry, C. Boyce, D. Chaszar, B. Culrich, M. Khisin, G. Knezeck, W. Linam-Church, S. Liu, M. Stewart and D. Toney; Microsoft Research Technical Report (MSR-TR-2007-94) 2007.

Ph.D. Thesis


Note: In Computer Science, publications at top-ranking conferences are considered more important and prestigious than journals (of course they have their place as well). Here is an official memo from the Computing Research Association (CRA) stating that fact.


Some systems/real-time conference rankings: 1, 2, 3.

Of course, these not authoritative and not in any order, and they seem to have a slight bias towards US-based conferences.

<< Home