71,217 Hits in 6.4 sec

Save-IDE: An Integrated Development Environment for Building Predictable Component-Based Embedded Systems

Severine Sentilles, Paul Pettersson, Ivica Crnkovic, John Håkansson
2008 2008 23rd IEEE/ACM International Conference on Automated Software Engineering  
Save-IDE is specialized for the domain of dependable embedded systems, which in addition to standard design tools requires tool support for analysis and verification of particular properties of such systems  ...  In this paper we present an Integrated Development Environment Save-IDE, a toolset that embraces several tools: a tool for designing component-based systems and components, modeling and predicting certain  ...  Further, compared to desktop and pure software systems, software in embedded systems have significantly different design models from execution models; while for example design models can utilize component  ... 
doi:10.1109/ase.2008.87 dblp:conf/kbse/SentillesPCH08 fatcat:l62nfyixbvcermsxgu3cw3rjye

SBAP: Software-Based Attestation for Peripherals [chapter]

Yanlin Li, Jonathan M. McCune, Adrian Perrig
2010 Lecture Notes in Computer Science  
Therefore, it is desirable for a host system to be able to verify the firmware integrity of attached peripherals.  ...  In this work, we propose a Software-Based Attestation technique for Peripherals that verifies the firmware integrity of a peripheral and detects malicious changes with a high probability, even in the face  ...  To prevent known attacks, SBAP leaves no available empty space in memory for attackers by filling all unused space in program and data memory with pseudo-random values, and verifying the integrity of both  ... 
doi:10.1007/978-3-642-13869-0_2 fatcat:ig74g42e6fdy5ngmiplzys4keq

Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices [chapter]

Florian Kohnhäuser, Stefan Katzenbeisser
2016 Lecture Notes in Computer Science  
Recently, more and more software vulnerabilities in embedded systems are disclosed, as they become appealing targets for cyber attacks.  ...  Therefore, after code update execution, the scheme must verify whether all devices are in a trustworthy, i.e., an unmodified and up-to-date, software state.  ...  Embedded systems verify the integrity and authenticity of code updates, but the initiator of the code update is unable to verify whether embedded systems indeed install the code update appropriately.  ... 
doi:10.1007/978-3-319-45741-3_17 fatcat:4blcbnzm6ncbva5c5ft6ux5t6u

OAT: Attesting Operation Integrity of Embedded Devices [article]

Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha
2019 arXiv   pre-print
We then design and build a system, OAT, that enables remote OEI attestation for ARM-based bare-metal embedded devices.  ...  To fill this void, we first formulate a new security property for embedded devices, called "Operation Execution Integrity" or OEI.  ...  TrustZone is a hardware feature available on both Cortex-A processors (for mobile and high-end IoT devices) and Cortex-M processors (for low-cost embedded systems).  ... 
arXiv:1802.03462v3 fatcat:u3ogiw5tpreebnt5skmzshjo2i

OAT: Attesting Operation Integrity of Embedded Devices

Zhichuang Sun, Bo Feng, Long Lu, Somesh Jha
2020 2020 IEEE Symposium on Security and Privacy (SP)  
We then design and build a system, OAT, that enables remote OEI attestation for ARM-based bare-metal embedded devices.  ...  To fill this void, we first formulate a new security property for embedded devices, called "Operation Execution Integrity" or OEI.  ...  TrustZone is a hardware feature available on both Cortex-A processors (for mobile and high-end IoT devices) and Cortex-M processors (for low-cost embedded systems).  ... 
doi:10.1109/sp40000.2020.00042 dblp:conf/sp/SunFLJ20 fatcat:rkgqqw4gpfbptdqoigprsqhcee

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device

Yu Qin, Jingbin Liu, Shijun Zhao, Dengguo Feng, Wei Feng
2020 Security and Communication Networks  
In this paper, we propose a novel and practical scheme for software trusted execution based on lightweight trust.  ...  Software measurement and attestation are general methods to detect software integrity and their executing states in IoT.  ...  Acknowledgments e research presented in this paper was supported by National Key R&D Program of China (2018YFB0904903 and 2020YFE0200600) and National Natural Science Foundation of China (Nos. 61872343  ... 
doi:10.1155/2020/8957641 fatcat:w373tmsvqna5tniaatv7viqqmq

Reasoning About Concurrency in High-Assurance, High-Performance Software Systems [chapter]

June Andronick
2017 Lecture Notes in Computer Science  
Code execution can be parallelised on different cores, and the challenge, for implementation as well as verification, is to ensure safe sharing between cores.  ...  In this paper we first briefly explain these kinds of concurrency and their challenges, and we then describe our recent and current work in providing concurrency reasoning framework and verifying concurrent  ...  The author would like to thank the people that have worked on the research presented in this paper: Sidney  ... 
doi:10.1007/978-3-319-63046-5_1 fatcat:etyhrw4auradbptcsixj6zeq4y

Putting It All Together

Rolf Earnest, Rolf Ernst
2003 Queue  
INTEGRATION CHALLENGES The three main types of design tasks in embedded system integration are: • Component and subsystem interfacing • System verifi cation • System optimization with design space exploration  ...  Unfortunately, compilers that could automatically adapt the code are not yet available-and designers are happy if they can avoid assembly coding.  ... 
doi:10.1145/644254.644268 fatcat:i6jgozhtajg7pnb3bbyb6vcryq

A low overhead hardware technique for software integrity and confidentiality

Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic
2007 2007 25th International Conference on Computer Design  
The signatures embedded in the code are verified during program execution. Software confidentiality is provided by encrypting instruction blocks.  ...  Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tampering with buses, memory  ...  In embedded systems, adversaries can easily get physical access to the system and can probe buses and tamper with code and data in main memory, hard disk, and I/O devices.  ... 
doi:10.1109/iccd.2007.4601889 dblp:conf/iccd/RogersMM07 fatcat:cgytoktd4zfu7lvplhtbpzzdou

Knowledge-Based Control of Reactive Systems with Multi-Layer Architecture

P. Matyasik, G. J. Nalepa
2007 2007 14th International Conference on Mixed Design of Integrated Circuits and Systems  
This paper presents a concept of an integrated development platform for fast and error-free implementation of embedded intelligent systems.  ...  The main idea reside in dividing the control program into separate logic layers. The lowest-level layer uses embedded real-time operating system.  ...  Future research will be concentrated on improving the visual representation of the knowledge in editor, and extending real-time control features provided by the HexorNG environment. THE AUTHORS  ... 
doi:10.1109/mixdes.2007.4286247 fatcat:jo3quengbfdfvh2euio5djte6q

From Design Specification to SystemC

Mohamed T. Kimour, Rachid Boudour
2006 Journal of Computer Science  
The mapping to SystemC code offers not only a system-level executable specification, but also a means to facilitating the system partitioning in hardware and software parts.  ...  Such a framework uses as input UML state machine and object diagrams, which are more and more used as design models in embedded systems.  ...  The interest in formal methods aiming at verifying embedded systems has increased recently due to the important role of correctness in such systems.  ... 
doi:10.3844/jcssp.2006.201.204 fatcat:4nukaeyae5hwvn5utvy63lxz3m

Save-IDE - A tool for design, analysis and implementation of component-based embedded systems

Severine Sentilles, Anders Pettersson, Dag Nystrom, Thomas Nolte, Paul Pettersson, Ivica Crnkovic
2009 2009 IEEE 31st International Conference on Software Engineering  
component and system behaviors already in early development phases, and a fully automated transformation of the system of components into an executable image.  ...  The paper presents Save-IDE, an Integrated Development Environment for the development of component-based embedded systems.  ...  In this paper we present the Save Integrated Development Environment (Save-IDE) which gathers tools and techniques needed in the development process of dependable embedded systems and integrates them with  ... 
doi:10.1109/icse.2009.5070567 dblp:conf/icse/SentillesPNNPC09 fatcat:r4t26oe25fbnfpkn2uvhaw3fou

Making Java work for microcontroller applications

S.A. Ito, L. Carro, R.P. Jacobi
2001 IEEE Design & Test of Computers  
In embedded applications, for example, low power consumption, high code density, and the ability to integrate peripheral devices into the same circuit can be more important than performance requirements  ...  However, applications based on devices embedded in consumer electronics have different design constraints than those of stand-alone systems.  ...  Integrating memory and communication interfaces in the same die can save power and simplify system design.  ... 
doi:10.1109/54.953277 fatcat:pokejlysyrcgxaxarjdehbfhoe

Security extensions for integrity and confidentiality in embedded processors

Austin Rogers, Aleksandar Milenković
2009 Microprocessors and microsystems  
With current trends toward embedded computer systems' ubiquitous accessibility, connectivity, diversification, and proliferation, security becomes a critical issue in embedded computer systems design and  ...  These extensions ensure the integrity and confidentiality of both instructions and data, introducing low performance overhead (1.86% for instructions and 14.9% for data).  ...  An embedded system with a proposed secure processor configured to operate in a secure mode allows execution of trusted programs only (code integrity).  ... 
doi:10.1016/j.micpro.2009.06.002 fatcat:55xe2pry2feabgjkekktggee6u

Model-Based Development of Fault-Tolerant Embedded Software

Christian Buckl, Alois Knoll, Gerhard Schrott
2006 Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006)  
Unfortunately there are only few model-based tools available for the design of faulttolerant embedded software: while there exist many different code generators for application code, the generation of  ...  system aspects like process management, communication in a distributed system and fault-tolerance mechanisms is very complex due to the heterogeneity of the embedded systems.  ...  A simple example for such a template is depicted and explained in section IV-D.  ... 
doi:10.1109/isola.2006.22 dblp:conf/isola/BucklKS06 fatcat:jjprs65h3nc3zf7lfp7erljfj4
« Previous Showing results 1 — 15 out of 71,217 results