The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a virtualization architecture for the multi-core embedded system to provide more system reliability and security while maintaining the same performance without introducing additional special hardware supports or having to implement complex protection mechanism in the virtualization layer. Virtualization has been widely used in embedded systems, especially in consumer electronics,...
Multi-core processors are being increasingly adopted for embedded systems because they improve performance, power consumption and lower development cost. Composing multiple operating systems on a multi-core processor enhances the reusability of software when developing rich functional embedded systems. Multiple OS environments enable the product to use two versions of an operating system at the same...
Service-level reuse development has drawn great attention in the research field of embedded systems. In this paper, we present reusable integrity management services for future embedded systems based on virtualization technique. A series of problems related with system security and reliability are addressed by adopting these services to existing system designs. Moreover, we have implemented the prototype...
In this paper, a runtime self-diagnosis and self-recovery infrastructure is presented for embedded systems. Different from existing methods of off-line tracing system logs, our research focuses on analyzing system kernel data structures from runtime memory periodically against predefined constraints. If any violations have been detected, recovery functions are invoked. The prototype system is developed...
Recently, for embedded systems, the complexity of the software is rapidly increasing due to the advancement in the fields of multimedia and network. Due to these developments, it is difficult to find the cause of problems in system. This is especially true when the causes of problems are buried in the kernel layer, finding them more difficult to compare with the user layer. One reason of the difficulties...
Our society depend on embedded and ubiquitous computing and the reliability of embedded software becomes more and more important. We have conducted a five years project with industries to develop software for realizing highly reliable embedded systems. We have tackled reliability issues from the following aspects. (1)Design environment: we have developed a UML design verification tool that apply model...
In this paper, online system-level self-healing support is presented for embedded systems. Different from off-line log analysis methods used by conventional intrusion detection systems, our research focuses on analyzing runtime kernel data structures hence perform self-diagnosis and self-healing. Inside the infrastructure, self-diagnosis and self-healing solutions have been implemented based on several...
Currently, for embedded systems, the complexity of the software is rapidly increasing due to the advance in the fields of multimedia and network. It is difficult to find the cause of problems. Especially, when the causes of problems are buried in the kernel layer, finding them from application's layer is not easy. One reason of the difficulties comes from that there are not effective tools and functions...
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candidates. In this paper, a lightweight system-level detection and recovery infrastructure is presented for embedded systems. Inside the infrastructure, specific runtime protections have been implemented for different kernel objects,...
Recently, the engineering cost of embedded systems is rapidly increasing due to growing sophistication of services. To deal with the problem, hybrid operating system environments have been proposed. This enables to run a RTOS and a general purpose OS concurrently and to reuse software resources on both of them. This approach is efficient in reducing engineering costs. We reconfigured the requirement...
In this paper, a lightweight system level monitoring infrastructure known as kernel objects monitoring infrastructure (KOMI) is presented for commercial-off-the-shelf (COTS) embedded systems. The kernel objects consist of certain critical kernel data structures and entry points of system calls, which are protected as first-class objects inside the system. KOMI provides specific runtime protections...
In ubiquitous computing environments, our daily lives will be made convenient by embedded intelligent devices. Those devices, such as car navigation systems, personal digital assistances, and cellular phones, provide various kinds of the complex services. Those devices are networked with each other and provide complicated services, through the Internet. While they provide useful services, there is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.