I. Introduction
The widespread use of real-time systems in security-critical applications such as monitoring and controlling physical systems [1], autonomous driving of intelligent vehicles [2], aerospace [3], transportation [4], and sensitive infrastructures such as power grid and water systems [5] has brought some serious Security challenges endangering human life or environmental damages [6]. Therefore, ensuring the security of many-core systems has become a topic for security-critical real-time system research [7], [8]. Figure 1 shows the structure of a typical security-critical real-time many-core system that uses classical security modules. Although there is no easy way to have direct access to these systems and the adversaries face several difficulties in applying traditional security attack methods, there are new ways to infiltrate these systems.