Doina Bucur. Temporal Monitors for

Size: px
Start display at page:

Download "Doina Bucur. Temporal Monitors for"

Transcription

1 Doina Bucur / Temporal Monitors for 1

2 Application area: wireless sensor/actuator systems running TinyOS, a best-effort, asynchronous embedded OS In summary: 2

3 Application area: wireless sensor/actuator systems running TinyOS, a best-effort, asynchronous embedded OS Specifications: qualitative temporal (LTL) with: atomic propositions = { boolean expressions over variables; checkpoints, including interrupts } In summary: 2

4 Application area: wireless sensor/actuator systems running TinyOS, a best-effort, asynchronous embedded OS Specifications: qualitative temporal (LTL) with: atomic propositions = { boolean expressions over variables; checkpoints, including interrupts } Verifier: native TinyOS software component quantified overhead emulation: absolute RAM and CPU overhead per monitor is negligible; ROM overhead for a basic LTL pattern is ~5.5% of that available on a Telos revision B platform. In summary: 2

5 : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in

6 : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. 3

7 : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. [2002] Network embedded system C (nesc) is developed, Intel Research / UC Berkeley. 3

8 RS2!-)+,/H&$!76<!"#$%"&'() O#,,%O$# RS2 (#,,%O$#) : A network embedded OS [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in RS2!1%O%&'%!76<?U*&,!S^S O#,,%O$#) 76</ Y-:Z O#,,%O$#) RS2 "&O)#O#,$)#..%) [ ((?C?B 1+I&# <&D&$+.!/K&$O= wireless-sensor-networks/wireless- 8/#.+$&,D!RS2!F)#H H&O)#O#,$)#..%) modules.html ] -%V+/!8,/$)JH%,$/ "S5CEB![>W>> CGUP&$!/&.&O#, H&O)#O#,$)#..%) /%)&+.!8< S": :,$%,,+ (#,,%O$#)!"#$%"&'() [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. [2002] Network embedded system C (nesc) is developed, Intel Research / UC Berkeley. RS2 [.+/=!0?\23 E?\X] #/O&..+$#) S-!(#I% [.+/=!0>"23! 0,1$+&'2'3'0+"/.'4/#'54*6'"7'.8&'9&%")':"#$%&' "#$%&'!(#)*#)+$&#,!! -%.#/!01%'!23!4!51678"89:1;!<+$+/=%%$!0>?@A@?BBC3! 3

9 O#,,%O$#!"#$%"&'() RS2!-)+,/H&$!76< RS2 (#,,%O$#) : A network embedded OS RS2!1%O%&'%!76< [1999] Born at UC Berkeley, under the DARPA Network Embedded Systems Technology (NEST) project. First public version in RS2 76</ ((?C?B S": [ "&O)#O#,$)#..%) 1+I&# :,$%,,+ <&D&$+.!/K&$O= Y-:Z wireless-sensor-networks/wireless(#,,%o$#) 8/#.+$&,D!RS2!F)#H O#,,%O$#)!"#$%"&'() H&O)#O#,$)#..%) modules.html ] -%V+/!8,/$)JH%,$/ "S5CEB![>W>> H&O)#O#,$)#..%) CGUP&$!/&.&O#, /%)&+.!8<?U*&,!S^S O#,,%O$#) [2000] Berkeley designs a platform; Crossbow, Inc., mass produces the hardware. [2002] Network embedded system C (nesc) is developed, Intel Research / UC Berkeley. "#$%&'!(#)*#)+$&#,!! 3 RS2 [.+/=!0?\23 E?\X] #/O&..+$#) S-!(#I% [.+/=!0>"23! 0,1$+&'2'3'0+"/.'4/#'54*6'"7'.8&'9&%")':"#$%&' -%.#/!01%'!23!4!51678"89:1;!<+$+/=%%$!0>?@A@?BBC3! [ lifeunderyourfeet.org / Microsoft Research Sensor Map ]

10 high-level logic nesc is modular TinyOS application TinyOS system components Hardware HPL 4

11 high-level logic nesc is modular TinyOS application TinyOS system components Hardware HPL 4

12 ...with interrupt-based concurrency calls command startperiodic() signals event fired() Event handlers execute with priority. A single interrupt level. Events may cascade on some platforms....with sequential event handlers, plus deferred computational tasks. 5

13 Native verifier in TinyOS TinyOS application TinyOS system components Runtime path verifier Hardware The verifier is a new OS component (offline, generated). 6

14 Instrumentation NesC instrumentation (offline, manual): events rooted in hardware interrupts, software conditions or checkpoints; tested with 60+ through the OS nesc events signaled to verifier; signaling time as per system load 7

15 configuration HplMsp430GeneralIOC { [..] } Instrumentation implementation { [..] components PaxLTLC; NesC [..] instrumentation (offline, manual): events rooted in hardware interrupts, software conditions or checkpoints; PaxLTLC.notify tested with <-60+ P10.pax_notify; through the OS PaxLTLC.notify <- P11.pax_notify; nesc PaxLTLC.notify events signaled <-to P12.pax_notify; verifier; signaling time as per system load } // where P10, P11, etc are instantiations of HplMsp430Gene [..] generic module HplMsp430GeneralIOP([..]) { [..] uses async event void notify(uint16_t ap, bool val); } implementation { [..] async command void IO.set() { [..] signal pax_notify((portx*10+pin), TRUE);} async command void IO.clr() { [..] 7

16 System specifications Low visibility of system faults in deployments. There exists a broad but incomplete set of system specifications, fault reports node-local / distributed 8

17 System specifications Low visibility of system faults in deployments. There exists a broad but incomplete set of system specifications, fault reports node-local / distributed Buffer and stack overflows, deadlocked/livelocked software, data races. 8

18 System specifications Low visibility of system faults in deployments. There exists a broad but incomplete set of system specifications, fault reports node-local / distributed Buffer and stack overflows, deadlocked/livelocked software, data races. No next-hop destination for routing in a multihop network; unexpected value, outlier or gradient in sensed data or battery level; incorrect order of use of the OS kernel s API. 8

19 LTL patterns (basic) # Universality. p is true : # (F01) Globally [](p) # (F02) Before r <>r -> (p U r) # (F03) After q [](q -> [](p)) # (F04) Between q and r []((q &!r & <>r) -> (p U r)) # (F05) After q until r [](q &!r -> (p W r)) # Precedence. s precedes p: # (F16) Globally!p W s # (F17) Before r <>r -> (!p U (s r)) # (F19) Between q and r []((q &!r & <>r) -> (!p U (s r))) # (F20) After q until r [](q &!r -> (!p W (s r))) Between an timer alarm and the next one there must be new sensor data. Every time a LED is on, it must have been preceded by the sending of a packet. 9

20 [..] g. 3. Wiring and instrumentation added to the HPL components which control t crocontroller pins on the TelosB; the logging is done by signalling the notify eve istence-after (E-A), etc, and we omit them from the evaluation results. ese, we add two composite properties which are practically useful: k_ i=1 LTL patterns (composed) Gp i and a generic event-sequence chain p 1 U(p 2 U(...Up k )) d also multiple basic monitors checking the same application. Into these property types, we randomly input combinations of atomic prop ions from our list of relevant system events. The resulting specifications a her violated or satisfied by the system software; our monitors will repo ether the checking In both has cases, finished randomly (thusgenerated a violation formulas. was encountered) in re e, at the end of each monitoring step variable finished checking e monitor implementation from Fig. 5 records the verification status, and orted Doina Bucur, to RV 12 the system users. 10

21 Monitor generation 2 r s 1!p &!r &!s p &!r &!s 1 3!r F r (!p U ( s r )) Fig. 4. Deterministic monitor generated for the speci- (Precedence pattern, Before scope) fication F r! (!p U ( s r )). Generated with a LTL-to-TGBA State 1 is the initial state, and translator (part of SPOT). each transition is accepting. Deterministic, all transitions accepting. implementation { async event void notify(uint16_t ap, bool val) { // store (ap, val) if (!finished_checking) post step(); } task void step() { atomic { // calculate new state with (ap, val) current_checking_steps++; current = next; next = -1; if (current == 1) { if ((call statebv.get(r)) (call statebv.get(s))) next = 2; else if ((call statebv.get(p)) &&!(call statebv.get(r)) &&!(call statebv.get(s))) next = 3; else if (!(call statebv.get(p)) &&!(call statebv.get(r)) && 11

22 r s p &!r &!s } Monitor 2 generation 2 r s 1 3!r Fig. 4. Deterministic monitor generated for the specification F r! (!p U ( s r )). State 1 is the initial state, and each transition is accepting. 1!p &!r &!s p &!r &!s 1 3!r F r (!p U ( s r )) Fig. 4. Deterministic monitor generated for the speci- (Precedence pattern, Before scope) fication F r! (!p U ( s r )). Generated with a LTL-to-TGBA State 1 is the initial state, and translator (part of SPOT). each transition is accepting. Deterministic, all transitions accepting. task void step() { atomic { // calculate new state with (ap, val) current_checking_steps++; current = next; next = -1; if (current == 1) { implementation { async event if ((call void notify(uint16_t statebv.get(r)) ap, (call statebv.get(s))) bool val) { // store next (ap, = val) 2; if (!finished_checking) else if ((call statebv.get(p)) && post step();!(call statebv.get(r)) && }!(call statebv.get(s))) next = 3; task void else step() if (!(call { statebv.get(p)) && atomic {!(call statebv.get(r)) && // calculate!(call new state statebv.get(s))) with (ap, val) current_checking_steps++; next = 1; current } = next; next = -1; else if (current == 2) { if (current next = 2; == 1) { } if ((call statebv.get(r)) else(call if (current statebv.get(s))) == 3) { if next (!(call = 2; statebv.get(r))) else next if ((call = 3; statebv.get(p)) && }!(call statebv.get(r)) && finished_checking!(call statebv.get(s))) = (next == -1); }}} next = 3; else if (!(call statebv.get(p)) && 11!(call statebv.get(r)) &&

23 Tool chain AP set LTL: [](q -> [](p)) SPOT r s 1!p &!r &!s p &!r &!s implementation { async event void notify(uint16_t bool val) { // store (ap, val) if (!finished_checking) post step(); } TinyOS application TinyOS system components AP set Hardware !r language translator Fig. 4. Deterministic monitor generated for the specification F r! (!p U ( s r )). State 1 is the initial state, and each transition is accepting. Runtime path verifier ncc binary task void step() { atomic { // calculate new state with ( current_checking_steps++; current = next; next = -1; if (current == 1) { if ((call statebv.get(r)) (call statebv.get(s))) next = 2; else if ((call statebv.get!(call statebv.get(r!(call statebv.get(s next = 3; else if (!(call statebv.ge!(call statebv.get(r!(call statebv.get(s next = 1; } else if (current == 2) { next = 2; } notification else if (current == 3) { and trace if (!(call statebv.get(r)) next = 3; } finished_checking = (next == emulator

24 Evaluation For CPU and stack overhead: emulator (MSPsim for TelosB). For (other) memory overhead: compilation to executable suffices (there is no dynamic allocation). 13

25 Monitor size Kilobytes ROM overhead (TelosB) RAM overhead (TelosB) Bytes Automaton size (no. states x no. transitions) 14

26 CPU overhead 1.25 CPU overhead (TelosB) Added load % Timeline in duty cycle x 20ms Accurate to the clock tick (advantage of emulating), modulo sampling rate. 15

27 Kilobytes ROM overhead (TelosB) ROM overhead (MicaZ) U-G U-B U-A U-W U-AB A-G A-B A-A A-W A-AB E-G E-B E-A E-W E-AB P-G P-B P-A P-W P-AB R-G R-B R-A R-W R-AB BE-G BE-B BE-A BE-W BE-AB LTL property pattern and scope ROM overhead 16

28 30 RAM overhead (TelosB) RAM overhead (MicaZ) Bytes U-G U-B U-A U-W U-AB A-G A-B A-A A-W A-AB E-G E-B E-A E-W E-AB P-G P-B P-A P-W P-AB R-G R-B R-A R-W R-AB BE-G BE-B BE-A BE-W BE-AB LTL property pattern and scope RAM overhead 17

29 18

Temporal Monitors for TinyOS

Temporal Monitors for TinyOS Temporal Monitors for TinyOS Doina Bucur Innovation Centre for Advanced Sensors and Sensor Systems (INCAS 3 ), The Netherlands doinabucur@incas3.eu Abstract. Networked embedded systems generally have extremely

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Runtime Verification for Real-Time Automotive Embedded Software

Runtime Verification for Real-Time Automotive Embedded Software Runtime Verification for Real-Time Automotive Embedded Software S. Cotard, S. Faucou, J.-L. Béchennec, A. Queudet, Y. Trinquet 10th school of Modelling and Verifying Parallel processes (MOVEP) Runtime

More information

Formal Verification by Model Checking

Formal Verification by Model Checking Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking

More information

REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS REMOTE TEMPERATURE AND HUMIDITY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Varsha jaladi 1, Guthula Ganga Raja Sekhar 2, K.Raghava Rao 3 1 BTech Student, dept. of Electronics and Computers, K L University,

More information

Towards Lightweight Logging and Replay of Embedded, Distributed Systems

Towards Lightweight Logging and Replay of Embedded, Distributed Systems Towards Lightweight Logging and Replay of Embedded, Distributed Systems (Invited Paper) Salvatore Tomaselli and Olaf Landsiedel Computer Science and Engineering Chalmers University of Technology, Sweden

More information

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot

More information

Comparison of Operating Systems TinyOS and Contiki

Comparison of Operating Systems TinyOS and Contiki Comparison of Operating Systems TinyOS and Contiki Tobias Reusing Betreuer: Christoph Söllner Seminar: Sensorknoten - Betrieb, Netze & Anwendungen SS2012 Lehrstuhl Netzarchitekturen und Netzdienste, Lehrstuhl

More information

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts

More information

Operating Systems. Lecture 03. February 11, 2013

Operating Systems. Lecture 03. February 11, 2013 Operating Systems Lecture 03 February 11, 2013 Goals for Today Interrupts, traps and signals Hardware Protection System Calls Interrupts, Traps, and Signals The occurrence of an event is usually signaled

More information

Introduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu

Introduction to Operating Systems. Perspective of the Computer. System Software. Indiana University Chen Yu Introduction to Operating Systems Indiana University Chen Yu Perspective of the Computer System Software A general piece of software with common functionalities that support many applications. Example:

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Using a Generic Plug and Play Performance Monitor for SoC Verification

Using a Generic Plug and Play Performance Monitor for SoC Verification Using a Generic Plug and Play Performance Monitor for SoC Verification Dr. Ambar Sarkar Kaushal Modi Janak Patel Bhavin Patel Ajay Tiwari Accellera Systems Initiative 1 Agenda Introduction Challenges Why

More information

Chapter 3 Operating-System Structures

Chapter 3 Operating-System Structures Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Chapter 6, The Operating System Machine Level

Chapter 6, The Operating System Machine Level Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General

More information

I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich

I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation. Mathias Payer, ETH Zurich I Control Your Code Attack Vectors Through the Eyes of Software-based Fault Isolation Mathias Payer, ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application

More information

RCL: Software Prototype

RCL: Software Prototype Business Continuity as a Service ICT FP7-609828 RCL: Software Prototype D3.2.1 June 2014 Document Information Scheduled delivery 30.06.2014 Actual delivery 30.06.2014 Version 1.0 Responsible Partner IBM

More information

Chapter 13 Embedded Operating Systems

Chapter 13 Embedded Operating Systems Operating Systems: Internals and Design Principles Chapter 13 Embedded Operating Systems Eighth Edition By William Stallings Embedded System Refers to the use of electronics and software within a product

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard

A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard A304a: Understanding User Needs for Field Management Stations Part 1 Object Definitions for Signal System Masters (SSM) Based on NTCIP 1210 Standard Table of Contents Introduction/Purpose... 2 SSM User

More information

Embedded Systems. 6. Real-Time Operating Systems

Embedded Systems. 6. Real-Time Operating Systems Embedded Systems 6. Real-Time Operating Systems Lothar Thiele 6-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

MBP_MSTR: Modbus Plus Master 12

MBP_MSTR: Modbus Plus Master 12 Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page

More information

The Xen of Virtualization

The Xen of Virtualization The Xen of Virtualization Assignment for CLC-MIRI Amin Khan Universitat Politècnica de Catalunya March 4, 2013 Amin Khan (UPC) Xen Hypervisor March 4, 2013 1 / 19 Outline 1 Introduction 2 Architecture

More information

The Microsoft Windows Hypervisor High Level Architecture

The Microsoft Windows Hypervisor High Level Architecture The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove (amislove@ccs.neu.edu) Operating System Services Operating systems provide an environment for

More information

Implementing Software on Resource- Constrained Mobile Sensors Experience with Impala and ZebraNet

Implementing Software on Resource- Constrained Mobile Sensors Experience with Impala and ZebraNet Implementing Software on Resource- Constrained Mobile Sensors Experience with Impala and ZebraNet T. Liu, C. Sadler, P. Zhang, and M. Martonosi, MobiSys 04 Presented by Fabián E. Bustamante (based on the

More information

Introduction to Software Verification

Introduction to Software Verification Introduction to Software Verification Orna Grumberg Lectures Material winter 2013-14 Lecture 4 5.11.13 Model Checking Automated formal verification: A different approach to formal verification Model Checking

More information

ADL User Guide for Open AT V4.10

ADL User Guide for Open AT V4.10 ADL User Guide for Open AT V4.10 Revision: 002 Date: September 2006 ADL User Guide for Open AT V4.10 Revision: 002 Date: Reference: WM_DEV_OAT_UGD_019 Confidential Page: 1 / 220 Document History Index

More information

Cloud Computing. Up until now

Cloud Computing. Up until now Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Architecture of the Kernel-based Virtual Machine (KVM)

Architecture of the Kernel-based Virtual Machine (KVM) Corporate Technology Architecture of the Kernel-based Virtual Machine (KVM) Jan Kiszka, Siemens AG, CT T DE IT 1 Corporate Competence Center Embedded Linux jan.kiszka@siemens.com Copyright Siemens AG 2010.

More information

Flexible Online Energy Accounting in TinyOS

Flexible Online Energy Accounting in TinyOS Flexible Online Energy Accounting in TinyOS Simon Kellner System Architecture Group Karlsruhe Institute of Technology kellner@kit.edu Abstract. Energy is the most limiting resource in sensor networks.

More information

Security of MICA*-based / ZigBee Wireless Sensor Networks

Security of MICA*-based / ZigBee Wireless Sensor Networks Security of MICA*-based / ZigBee Wireless Sensor Networks Cambridge University Computer Lab and myself also Brno University of Technology Department of Intelligent Systems 28 December 2008 Our approach

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

GIVE WINGS TO YOUR IDEAS TUTORIAL

GIVE WINGS TO YOUR IDEAS TUTORIAL GIVE WINGS TO YOUR IDEAS TUTORIAL PLUG IN TO THE WIRELESS WORLD Tutorial Version: 001 / 1.0 Date: October 30, 2001 Reference: WM_SW_OAT_UGD_001 confidential Page: 1 / 18 (THIS PAGE IS INTENTIONALY LEFT

More information

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps

More information

Do AUTOSAR and functional safety rule each other out?

Do AUTOSAR and functional safety rule each other out? Software development Do AUTOSAR and functional safety rule each other out? While simplicity is a factor in safety-critical applications, AUTOSAR has over 6,000 configuration parameters and well over 100,000

More information

Fine-Grained User-Space Security Through Virtualization. Mathias Payer and Thomas R. Gross ETH Zurich

Fine-Grained User-Space Security Through Virtualization. Mathias Payer and Thomas R. Gross ETH Zurich Fine-Grained User-Space Security Through Virtualization Mathias Payer and Thomas R. Gross ETH Zurich Motivation Applications often vulnerable to security exploits Solution: restrict application access

More information

PC Notebook Diagnostic Card

PC Notebook Diagnostic Card www.winter-con.com User s Guide PC Notebook Diagnostic Card User s Guide 1 www.winter-con.com User s Guide INTRODUCTION Notebook Diagnostic Card is a powerful diagnostic tool for technicians and administrators

More information

SYSTEM ecos Embedded Configurable Operating System

SYSTEM ecos Embedded Configurable Operating System BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original

More information

Übung zu Drahtlose Kommunikation. 10. Übung 14.01.2012

Übung zu Drahtlose Kommunikation. 10. Übung 14.01.2012 Übung zu Drahtlose Kommunikation 10. Übung 14.01.2012 TinyOS is an operating system designed to target limited-resource sensor network nodes TinyOS 0.4, 0.6 (2000-2001) TinyOS 1.0 (2002): first nesc version

More information

Technical Report CS-2006-27-11: A Performance Analysis of MANTIS and TinyOS

Technical Report CS-2006-27-11: A Performance Analysis of MANTIS and TinyOS Technical Report CS-26-27-11: A Performance Analysis of MANTIS and TinyOS Cormac Duffy, Utz Roedig, John Herbert and Cormac J. Sreenan Computer Science Department, University College Cork, Ireland Email:

More information

The Model Checker SPIN

The Model Checker SPIN The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(

More information

Computer-System Architecture

Computer-System Architecture Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture 2.1 Computer-System Architecture 2.2 Computer-System

More information

Computer Systems Structure Input/Output

Computer Systems Structure Input/Output Computer Systems Structure Input/Output Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Examples of I/O Devices

More information

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation International Journal of Smart Grid and Clean Energy Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation Aina Hu a *, Huanhuan Wang b, and Jianchen Wan a a Department

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference

More information

POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)

POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2) RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate

More information

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture

Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts

More information

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool

Outline. Outline. Why virtualization? Why not virtualize? Today s data center. Cloud computing. Virtual resource pool Outline CS 6V81-05: System Security and Malicious Code Analysis Overview of System ization: The most powerful platform for program analysis and system security Zhiqiang Lin Department of Computer Science

More information

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah (DSF) Soft Core Prozessor NIOS II Stand Mai 2007 Jens Onno Krah Cologne University of Applied Sciences www.fh-koeln.de jens_onno.krah@fh-koeln.de NIOS II 1 1 What is Nios II? Altera s Second Generation

More information

Real Time Programming: Concepts

Real Time Programming: Concepts Real Time Programming: Concepts Radek Pelánek Plan at first we will study basic concepts related to real time programming then we will have a look at specific programming languages and study how they realize

More information

Using the TASKING Software Platform for AURIX

Using the TASKING Software Platform for AURIX Using the TASKING Software Platform for AURIX MA160-869 (v1.0rb3) June 19, 2015 Copyright 2015 Altium BV. All rights reserved. You are permitted to print this document provided that (1) the use of such

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 1 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the application/operating

More information

Operating System Structures

Operating System Structures COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

Zing Vision. Answering your toughest production Java performance questions

Zing Vision. Answering your toughest production Java performance questions Zing Vision Answering your toughest production Java performance questions Outline What is Zing Vision? Where does Zing Vision fit in your Java environment? Key features How it works Using ZVRobot Q & A

More information

Chapter 2 System Structures

Chapter 2 System Structures Chapter 2 System Structures Operating-System Structures Goals: Provide a way to understand an operating systems Services Interface System Components The type of system desired is the basis for choices

More information

Trustworthy Computing

Trustworthy Computing Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with

More information

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16

Virtualization. P. A. Wilsey. The text highlighted in green in these slides contain external hyperlinks. 1 / 16 1 / 16 Virtualization P. A. Wilsey The text highlighted in green in these slides contain external hyperlinks. 2 / 16 Conventional System Viewed as Layers This illustration is a common presentation of the

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist

ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge

More information

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives

Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,

More information

Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB

Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer Dr. Johan Kraft, Percepio AB Debugging embedded software can be a challenging, time-consuming and unpredictable factor in development

More information

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.

Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote. Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.

More information

Software Engineering using Formal Methods

Software Engineering using Formal Methods Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

Unit 12 Database Recovery

Unit 12 Database Recovery Unit 12 Database Recovery 12-1 Contents 12.1 Introduction 12.2 Transactions 12.3 Transaction Failures and Recovery 12.4 System Failures and Recovery 12.5 Media Failures and Recovery Wei-Pang Yang, Information

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Fundamentals of Software Engineering

Fundamentals of Software Engineering Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner

More information

Cloud Operating Systems for Servers

Cloud Operating Systems for Servers Cloud Operating Systems for Servers Mike Day Distinguished Engineer, Virtualization and Linux August 20, 2014 mdday@us.ibm.com 1 What Makes a Good Cloud Operating System?! Consumes Few Resources! Fast

More information

Xenomai: integration and qualification of a real time operating system ARMadeus Systems

Xenomai: integration and qualification of a real time operating system ARMadeus Systems : integration and qualification of a real time operating system ARMadeus Systems Gwenhaël 8 july 2009 1 / 22 Plan 1 2 3 of in a Buildroot environment 4 5 6 2 / 22 : basics Real time extension for Linux.

More information

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications Joshua Ellul jellul@imperial.ac.uk Overview Brief introduction to Body Sensor Networks BSN Hardware

More information

Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation

Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation Automatic Logging of Operating System Effects to Guide Application-Level Architecture Simulation Satish Narayanasamy, Cristiano Pereira, Harish Patil, Robert Cohn, and Brad Calder Computer Science and

More information

MAC A Run Time monitoring and checking tool

MAC A Run Time monitoring and checking tool MAC A Run Time monitoring and checking tool Gursharan Singh Mohd. Salman Mehmood Agenda Motivation Software Development Steps Methods New Paradigm (Runtime Verification) Materializing Runtime Verification

More information

sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia

sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia sel4: from Security to Safety Gernot Heiser, Anna Lyons NICTA and UNSW Australia 1 OS Trade-Offs Usability Minix Android Linux Trustworthiness Minix Android L4 sel4 Performance Linux L4 sel4 2015 Gernot

More information

MOTEWORKS. Key Features. Overview

MOTEWORKS. Key Features. Overview MOTEWORKS SOFTWARE PLATFORM MoteWorks 2.0 provides a complete software development environment for wireless sensor network applications. Included is a collection of flexible software packages that enables

More information

Mutual Exclusion using Monitors

Mutual Exclusion using Monitors Mutual Exclusion using Monitors Some programming languages, such as Concurrent Pascal, Modula-2 and Java provide mutual exclusion facilities called monitors. They are similar to modules in languages that

More information

introduction to program monitoring

introduction to program monitoring introduction to program monitoring CS 119 part II beyond assert and print course website http://www.runtime-verification.org/course09 action standing order: sell when price drops more than 2% within 1

More information

Operating Systems for Wireless Sensor Networks: A Survey

Operating Systems for Wireless Sensor Networks: A Survey Sensors 2011, 11, 5900-5930; doi:10.3390/s110605900 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Operating Systems for Wireless Sensor Networks: A Survey Muhammad Omer Farooq

More information

Operating System Structures

Operating System Structures Operating System Structures Meelis ROOS mroos@ut.ee Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.

More information

Virtualization in Linux KVM + QEMU

Virtualization in Linux KVM + QEMU CS695 Topics in Virtualization and Cloud Computing KVM + QEMU Senthil, Puru, Prateek and Shashank 1 Topics covered KVM and QEMU Architecture VTx support CPU virtualization in KMV Memory virtualization

More information

CSC 774 Advanced Network Security. Outline. Related Work

CSC 774 Advanced Network Security. Outline. Related Work CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time

More information

A New Chapter for System Designs Using NAND Flash Memory

A New Chapter for System Designs Using NAND Flash Memory A New Chapter for System Designs Using Memory Jim Cooke Senior Technical Marketing Manager Micron Technology, Inc December 27, 2010 Trends and Complexities trends have been on the rise since was first

More information

Safety and Security Features in AUTOSAR

Safety and Security Features in AUTOSAR Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2

More information

Chapter 14 Virtual Machines

Chapter 14 Virtual Machines Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously

More information

Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs

Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs AN033101-0412 Abstract This describes how to interface the Dallas 1-Wire bus with Zilog s Z8F1680 Series of MCUs as master devices. The Z8F0880,

More information

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS

More information

How To Test In Tinyos With Unit Test (Forum) On A Microsoft Microsoft Computer (Forums) On An Ipa (Forms) On Your Computer Or Microsoft Macbook (Forims) On The Network (For

How To Test In Tinyos With Unit Test (Forum) On A Microsoft Microsoft Computer (Forums) On An Ipa (Forms) On Your Computer Or Microsoft Macbook (Forims) On The Network (For Unit Testing for Wireless Sensor Networks Michael Okola Computer Science Department University of Virginia Charlottesville, Virginia okola@virginia.edu Kamin Whitehouse Computer Science Department University

More information

Helping you avoid stack overflow crashes!

Helping you avoid stack overflow crashes! Helping you avoid stack overflow crashes! One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we

More information

COMPUTER HARDWARE. Input- Output and Communication Memory Systems

COMPUTER HARDWARE. Input- Output and Communication Memory Systems COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

EXPLORING LINUX KERNEL: THE EASY WAY!

EXPLORING LINUX KERNEL: THE EASY WAY! EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Load and Performance Testing

Load and Performance Testing Blaise Internet 4.8.4 Load and Performance Testing Lane Masterton Assistant Statistician Technology Services Division Australian Bureau of Statistics Content 1. Purpose 2. Test Targets 3. Approach 4. Solution

More information

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization

CS 695 Topics in Virtualization and Cloud Computing. More Introduction + Processor Virtualization CS 695 Topics in Virtualization and Cloud Computing More Introduction + Processor Virtualization (source for all images: Virtual Machines: Versatile Platforms for Systems and Processes Morgan Kaufmann;

More information

Debugging A MotoHawk Application using the Application Monitor

Debugging A MotoHawk Application using the Application Monitor CONTROL SYSTEM SOLUTIONS Debugging A MotoHawk Application using the Application Monitor Author(s): New Eagle Consulting 3588 Plymouth Road, #274 Ann Arbor, MI 48105-2603 Phone: +1 (734) 929-4557 Ben Hoffman

More information

Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 26 Real - Time POSIX. (Contd.) Ok Good morning, so let us get

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information