Chapter 1: Introduction (a) Reconfigurable hardware based embedded systems (b) Importance of Real Time Scheduling for such embedded architectures (c) Importance of Self Aware Security for such architectures Chapter 2: Background (a) Scheduling for embedded real time tasks and limitations of existing techniques (b) Security related to hardware attacks and limitations of existing techniques Chapter...