Gedare Bloom


This page is presented in reverse chronological order. Please refer to my Research page for a more cohesive and organized approach that highlights my publications in the context of the specific research problems that they address. See also my Google Scholar page. Some pdf links are broken because I cannot redistribute the text; feel free to ask me for an author copy and I will try to oblige.


  1.  Gedare Bloom,    Operating System Support for Shared Hardware Data Structures,  The George Washington University,  2013.  [ pdf ]


  1.  Gedare Bloom,  Joel Sherrill,  Tingting Hu,  Ivan Cibrario Bertolotti,    Real-Time Systems Development with RTEMS and Multicore Processors,  CRC Press,DOI: 10.1201/9781351255790,  2020.  [ pdf ]

Book Chapters

  1.  Habeeb Olufowobi,  Gedare Bloom,    Chapter 16 - Connected Cars: Automotive Cybersecurity and Privacy for Smart Cities,  in Smart Cities Cybersecurity and Privacy,  pp. 227-240,  Elsevier,DOI: 10.1016/B978-0-12-815032-0.00016-0,  2019.  [ pdf ]

  2.  Gedare Bloom,  Eugen Leontie,  Bhagirath Narahari,  Rahul Simha,    Chapter 12 - Hardware and Security: Vulnerabilities and Solutions,  in Handbook on Securing Cyber-Physical Critical Infrastructure,  pp. 305-331,  Morgan Kaufmann,  2012.  [ pdf ]

Journal Articles

  1.  James Marshall,  Robert Gifford,  Gedare Bloom,  Gabriel Parmer,  Rahul Simha,    Precise Cache Profiling for Studying Radiation Effects,  in ACM Transactions on Embedded Computing Systems,  vol. 20,  iss. 3,  pp. 25:1-25:25,DOI: 10.1145/3442339,  2021.  [ pdf ]

  2.  Uchenna Ezeobi,  Habeeb Olufowobi,  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    Reverse Engineering Controller Area Network Messages using Unsupervised Machine Learning,  in IEEE Consumer Electronics Magazine,  pp. 1-1,DOI: 10.1109/MCE.2020.3023538,  2020.  [ pdf ]
  3.  Habeeb Olufowobi,  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing,  in IEEE Transactions on Vehicular Technology,  vol. 69,  iss. 2,  pp. 1484-1494,DOI: 10.1109/TVT.2019.2961344,  2020.  [ pdf ]

  4.  Gedare Bloom,  Gianluca Cena,  Ivan Cibrario Bertolotti,  Tingting Hu,  Nicolas Navet,  Adriano Valenzano,    Event Notification in CAN-Based Sensor Networks,  in IEEE Transactions on Industrial Informatics,  vol. 15,  iss. 10,  pp. 5613-5625,DOI: 10.1109/TII.2019.2904082,  2019.  [ pdf ]
  5.  Clinton Young,  Joseph Zambreno,  Habeeb Olufowobi,  Gedare Bloom,    Survey of Automotive Controller Area Network Intrusion Detection Systems,  in IEEE Design Test,  vol. 36,  iss. 6,  pp. 48-55,DOI: 10.1109/MDAT.2019.2899062,  2019.  [ pdf ]
  6.  Udit Kumar Agarwal,  Vara Punit Ashokbhai,  Gedare Bloom,  Christian Mauderer,  Joel Sherrill,    Comparison of File Systems in RTEMS,  in SIGBED Rev.,  vol. 16,  iss. 3,  pp. 39-44,DOI: 10.1145/3373400.3373406,  2019.  [ pdf ]

  7.  Gedare Bloom,  Joel Sherrill,  Gary Gilliland,    Aligning Deos and RTEMS with the FACE Safety Base Operating System Profile,  in SIGBED Rev.,  vol. 15,  iss. 1,  pp. 15-21,DOI: 10.1145/3199610.3199612,  2018.  [ pdf ]

  8.  Gedare Bloom,  Joel Sherrill,    Scheduling and Thread Management with RTEMS,  in SIGBED Rev.,  vol. 11,  iss. 1,  pp. 20-25,DOI: 10.1145/2597457.2597459,  2014.  [ pdf ]

  9.  Eugen Leontie,  Gedare Bloom,  Olga Gelbart,  Bhagirath Narahari,  Rahul Simha,    A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks,  in Journal of Information Assurance and Security,  vol. 5,  iss. 1,  pp. 1-8,  2010.  [ pdf ]

  10.  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,  Joseph Zambreno,    Providing secure execution environments with a last line of defense against Trojan circuit attacks,  in Computers & Security,  vol. 28,  iss. 7,  pp. 660-669,DOI: 10.1016/j.cose.2009.03.002,  2009.  [ pdf ]

Conference and Workshop Papers

  1.  Gedare Bloom,    WeepingCAN: A Stealthy CAN Bus-off Attack,  in Workshop on Automotive and Autonomous Vehicle Security,  Internet Society,DOI:,  2021.  [ pdf ]

  2.  Prajjwal Dangal,  Gedare Bloom,    Towards Industrial Security Through Real-time Analytics,  in 2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC),  pp. 156-157,DOI: 10.1109/ISORC49007.2020.00036,  2020.  [ pdf ]
  3.  Gedare Bloom,  Joel Sherrill,    Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard,  in 2020 IEEE 23rd International Symposium on Real-Time Distributed Computing (ISORC),  pp. 98-105,DOI: 10.1109/ISORC49007.2020.00023,  2020.  [ pdf ]

  4.  Habeeb Olufowobi,  Sena Hounsinou,  Gedare Bloom,    Controller Area Network Intrusion Prevention System Leveraging Fault Recovery,  in Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy,  pp. 63-73,  Association for Computing Machinery,DOI: 10.1145/3338499.3357360,  2019.  [ pdf ]
  5.  Mitra Nasri,  Thidapat Chantem,  Gedare Bloom,  Ryan M. Gerdes,    On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks,  in 2019 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),  pp. 103-116,DOI: 10.1109/RTAS.2019.00017,  2019.  [ pdf ]
  6.  Habeeb Olufowobi,  Uchenna Ezeobi,  Eric Muhati,  Gaylon Robinson,  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network,  in Proceedings of the ACM Workshop on Automotive Cybersecurity,  pp. 25-30,  ACM,DOI: 10.1145/3309171.3309178,  2019.  [ pdf ]
  7.  Clinton Young,  Habeeb Olufowobi,  Gedare Bloom,  Joseph Zambreno,    Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes,  in Proceedings of the ACM Workshop on Automotive Cybersecurity,  pp. 9-14,  ACM,DOI: 10.1145/3309171.3309179,  2019.  [ pdf ]

  8.  H. Olufowobi,  G. Bloom,  C. Young,  J. Zambreno,    Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network,  in 2018 IEEE Real-Time Systems Symposium (RTSS),  pp. 161-164,DOI: 10.1109/RTSS.2018.00030,  2018.  [ pdf ]
  9.  S. Mohan,  M. Asplund,  G. Bloom,  A. Sadeghi,  A. Ibrahim,  N. Salajageh,  P. Griffioen,  B. Sinipoli,    Special Session: The Future of IoT Security,  in 2018 International Conference on Embedded Software (EMSOFT),  pp. 1-7,DOI: 10.1109/EMSOFT.2018.8537206,  2018.  [ pdf ]
  10.  G. Bloom,  B. Alsulami,  E. Nwafor,  I. C. Bertolotti,    Design patterns for the industrial Internet of Things,  in 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS),  pp. 1-10,DOI: 10.1109/WFCS.2018.8402353,  2018.  [ pdf ]
  11.  Ebelechukwu Nwafor,  Andre Campbell,  Gedare Bloom,    Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs,  in 1st International Workshop on Security and Privacy for the Internet-of-Things,  2018.  [ pdf ]

  12.  C. Tessler,  G. Bloom,  N. Fisher,    Work-in-Progress: Reducing Cache Conflicts via Interrupts and BUNDLE Scheduling,  in 2017 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),  pp. 125-128,DOI: 10.1109/RTAS.2017.30,  2017.  [ pdf ]
  13.  E. Nwafor,  A. Campbell,  D. Hill,  G. Bloom,    Towards a provenance collection framework for Internet of Things devices,  in 2017 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computed, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI),  pp. 1-6,DOI: 10.1109/UIC-ATC.2017.8397531,  2017.  [ pdf ]
  14.  G. Bloom,  G. Cena,  I. C. Bertolotti,  T. Hu,  A. Valenzano,    Supporting security protocols on CAN-based networks,  in 2017 IEEE International Conference on Industrial Technology (ICIT),  pp. 1334-1339,DOI: 10.1109/ICIT.2017.7915557,  2017.  [ pdf ]
  15.  G. Bloom,  G. Cena,  I. C. Bertolotti,  T. Hu,  A. Valenzano,    Optimized event notification in CAN through in-frame replies and Bloom filters,  in 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS),  pp. 1-10,DOI: 10.1109/WFCS.2017.7991963,  2017.  [ pdf ]

  16.  James Marshall,  Gabriel Parmer,  Rahul Simha,  Gedare Bloom,    N-Modular Redundant Real-Time Middleware: Design and Implementation,  in EWiLi 2016,  2016.  [ pdf ]
  17.  Clinton Young,  Joseph Zambreno,  Gedare Bloom,    Towards a Fail-Operational Intrusion Detection System for In-Vehicle Networks,  in Proceedings of the Workshop on Security and Dependability of Critical Embedded Real-Time Systems (CERTS),  2016.  [ pdf ]
  18.  Yuxin Ren,  Gabriel Parmer,  Teo Georgiev,  Gedare Bloom,    CBufs: Efficient, System-wide Memory Management and Sharing,  in Proceedings of the 2016 ACM SIGPLAN International Symposium on Memory Management,  pp. 68-77,  ACM,DOI: 10.1145/2926697.2926703,  2016.  [ pdf ]
  19.  Gedare Bloom,  Gabriel Parmer,  Rahul Simha,    LockDown: An Operating System for Achieving Service Continuity by Quarantining Principals,  in Proceedings of the 9th European Workshop on System Security,  pp. 7:1-7:6,  ACM,DOI: 10.1145/2905760.2905764,  2016.  [ pdf ]
  20.  J. Song,  G. Bloom,  G. Parmer,    SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems,  in 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),  pp. 227-238,DOI: 10.1109/DSN.2016.29,  2016.  [ pdf ]
  21.  Saurabh Gadia,  Cyrille Artho,  Gedare Bloom,    Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder,  in Formal Methods and Software Engineering,  pp. 417-432,  Springer, Cham,DOI: 10.1007/978-3-319-47846-3_26,  2016.  [ pdf ]

  22.  Daniel Cederman,  Daniel Hellström,  Joel Sherrill,  Gedare Bloom,  Mathieu Patte,  Marco Zulianello,    RTEMS SMP and MTAPI for Efficient Multi-Core Space Applications on LEON3/LEON4 Processors,  in Data Systems In Aerospace,  2015.  [ pdf ]
  23.  G. Bloom,  B. Narahari,  R. Simha,  A. Namazi,  R. Levy,    FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets,  in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),  pp. 48-51,DOI: 10.1109/HST.2015.7140235,  2015.  [ pdf ]
  24.  Hermann Felbinger,  Joel Sherrill,  Gedare Bloom,  Franz Wotawa,    Test Suite Coverage Measurement and Reporting for Testing an Operating System without Instrumentation,  in 17th Real Time Linux Workshop,  2015.  [ pdf ]

  25.  Eric Armbrust,  Jiguo Song,  Gedare Bloom,  Gabriel Parmer,    On Spatial Isolation for Mixed Criticality, Embedded Systems,  in Proc. 2nd Workshop on Mixed Criticality Systems (WMC), RTSS,  pp. 15-20,  2014.  [ pdf ]
  26.  Gedare Bloom,  Rahul Simha,    Hardware-enhanced Distributed Access Enforcement for Role-based Access Control,  in Proceedings of the 19th ACM Symposium on Access Control Models and Technologies,  pp. 5-16,  ACM,DOI: 10.1145/2613087.2613096,  2014.  [ pdf ]
  27.  Daniel Cederman,  Daniel Hellström,  Joel Sherrill,  Gedare Bloom,  Mathieu Patte,  Marco Zulianello,    RTEMS SMP for LEON3/LEON4 Multi-Processor Devices,  in Data Systems In Aerospace,  2014.  [ pdf ]

  28.  Scotty Smith,  Gedare Bloom,  Rahul Simha,    PyLOM: A Language and Run-time System for Planning Applications,  in Proceedings of the 2013 Companion Publication for Conference on Systems, Programming, & Applications: Software for Humanity,  pp. 91-92,  ACM,DOI: 10.1145/2508075.2522608,  2013.  [ pdf ]
  29.  Eugen Leontie,  Gedare Bloom,  Rahul Simha,    Hardware and Software Support for Fine-grained Memory Access Control and Encapsulation in C++,  in Proceedings of the 2013 Companion Publication for Conference on Systems, Programming, & Applications: Software for Humanity,  pp. 81-82,  ACM,DOI: 10.1145/2508075.2508091,  2013.  [ pdf ]

  30.  E. Leontie,  G. Bloom,  B. Narahari,  R. Simha,    No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains,  in 2012 15th Euromicro Conference on Digital System Design (DSD),  pp. 163-170,DOI: 10.1109/DSD.2012.89,  2012.  [ pdf ]
  31.  Gedare Bloom,  Gabriel Parmer,  Bhagirath Narahari,  Rahul Simha,    Shared hardware data structures for hard real-time systems,  in Proceedings of the tenth ACM international conference on Embedded software,  pp. 133-142,  ACM,DOI: 10.1145/2380356.2380382,  2012.  [ pdf ]

  32.  E. Leontie,  G. Bloom,  R. Simha,    Automation for creating and configuring security manifests for hardware containers,  in 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG),  pp. 1-2,  IEEE,DOI: 10.1109/SafeConfig.2011.6111677,  2011.  [ pdf ]

  33.  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,    Fab Forensics: Increasing Trust in IC Fabrication,  in 2010 IEEE International Conference on Technologies for Homeland Security,  2010.  [ pdf ]
  34.  Gedare Bloom,  Gabriel Parmer,  Bhagirath Narahari,  Rahul Simha,    Real-Time Scheduling with Hardware Data Structures,  in Work-in-Progress Session. IEEE Real-Time Systems Symposium,  2010.  [ pdf ]

  35.  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,    OS support for detecting Trojan circuit attacks,  in Hardware-Oriented Security and Trust, IEEE International Workshop on,  pp. 100-103,  IEEE Computer Society,DOI: 10.1109/HST.2009.5224959,  2009.  [ pdf ]
  36.  Eugen Leontie,  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,  Joseph Zambreno,    Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems,  in Computational Science and Engineering, IEEE International Conference on,  vol. 2,  pp. 830-836,  IEEE Computer Society,DOI:,  2009.  [ pdf ]
  37.  Eugen Leontie,  Gedare Bloom,  Bhagirath Narahari,  Rahul Simha,  Joseph Zambreno,    Hardware-enforced fine-grained isolation of untrusted code,  in Proceedings of the first ACM workshop on Secure execution of untrusted code,  pp. 11-18,  ACM,DOI: 10.1145/1655077.1655082,  2009.  [ pdf ]
  38.  Gedare Bloom,  Stefan Popoveniuc,    Information Leakage in Mix Networks with Randomized Partial Checking,  in International Conference on Information Security and Privacy,  2009.  [ pdf ]


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.