The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many analog and mixed signal devices have very few or no digital pins. In spite of this, these products can be highly complex internally, including significant digital content. They may contain various sensors and control circuitry, which react to a variety of conditions to control the power profile of the part and its environment. These factors can make these devices very challenging to test. They...
Modern devices often include several embedded instruments, such as BISTs, sensors, and other analogcomponents. New standards, such as IEEE Std. 1687, providevehicles to access these instruments. In approaches based onreconfigurable scan networks, instruments are coupled withscan registers, connected into chains and interleaved withreconfigurable multiplexers, permitting a selective access todifferent...
Modern systems-on-chips rely on embedded instruments for testing and debugging, the same instruments could be used for managing the lifetime dependability of the chips. The IEEE 1687 (iJTAG) standard introduces an access network to the instruments based on reconfigurable scan paths. During lifetime, instruments could be required to initiate communication with a system-level dependability manager for...
The IEEE 1687 standard describes reconfigurable structures allowing to flexibly access the instruments existing within devices (e.g., to support test, debug, calibration, etc.), by the use of configurable modules acting as controllable switches. The increasing adoption of this standard requires the availability of algorithms and tools to automate its usage. Since the resulting networks could inevitably...
This paper proposes a method which utilizing taint analysis to reduce the unnecessary analysis routine, concentrating on the control-flow altering input using concolic (concrete and symbolic) execution procedure. A prototype, Concolic Fuzz is implemented based on this method, which is built on Pin platform at x86 binary level and using Z3 as the SMT (Satisfiability Modulo Theories) solver. The results...
Due to the increasing usage of embedded instruments in many electronic devices, new solutions to effectively access these instruments appeared, including the new IEEE 1687 standard. The approach supported by IEEE 1687 allows a flexible access to embedded instruments through the Boundary Scan interface. The IEEE 1687 network includes a set of reconfigurable scan chains. This paper addresses the issue...
In software security testing, fuzz testing and symbolic execution are two main testing techniques. Fuzz testing finds program bugs by executing the target program with random inputs it generates while monitoring the execution for abnormal behaviors. Though fuzz testing is able to explore deep into a program's state space efficiently, it usually cannot guarantee the code coverage ratio in many situations...
The framework being proposed addresses the test and measurement of circuits and systems populated with varying types of sensors and functional blocks, among which one can find embedded test instruments. Its conceptual functionality is based on four types of operations: setup, capture, process, and scan (SCPS), and aims to provide a unifying methodology for managing and synchronizing test operations...
ABSTRACT: As fault handling in multi-processor system-on-chips (MPSoCs) is a major challenge, we have developed an MPSoC demonstrator that enables experimentation on fault injection and fault handling. Our MPSoC demonstrator consists of (1) an MPSoC model with a set of components (devices) each equipped with fault detection features, so called instruments, (2) an Instrument Access Infrastructure (IAI)...
Reverse Code Engineering (RCE) to detect anti-debugging techniques in software is a very difficult task. Code obfuscation is an anti-debugging technique makes detection even more challenging. The Rule Engine Detection by Intermediate Representation (REDIR) system for automated static detection of obfuscated anti-debugging techniques is a prototype designed to help the RCE analyst improve performance...
Instrumentation is an important part in the industrial automation domain as it is fundamentally required for process control loops. Virtual Prototyping (VP) as prime technology is considered as a novel approach to aid in the development Industrial Instruments. However, using state-of-the-art VP technologies requires a high degree of expertise, thereby limiting its usability among multi-disciplinary...
Code coverage tools are becoming increasingly popular as valuable aids in assessing and improving the quality of software structural tests. For some industries, such as aeronautics or space, they are mandatory in order to comply with standards and to help reduce the validation time of the applications. These tools usually rely on code instrumentation, thus introducing important time and memory overheads...
Based on information security technology of speculation implementation hardware, we design and implement the SHIFT(Speculative Hardware based Information Flow Tracking) system to enhance software security in cloud computing platform. SHIFT system uses that processor support delay exceptions, design and implement efficient dynamic information flow tracking technology. The system can detect low-level...
Kernel development is considered more challenging than user space development, partly due the lack of adequate development tools. We present LgDb, an innovative framework for kernel profiling, code coverage and instrumentation. LgDb is built on top of Lguest and allows running inspected kernel modules on virtual environment. The innovation lies on the fact that Lguest hypervisor takes active part...
Developing multithreaded programs in shared-memory systems is difficult. One key reason is the nondeterminism of thread interaction, which may result in one code input producing different outputs in different runs. Unfortunately, enforcing determinism by construction typically comes at a performance, hardware, or programmability cost. An alternative is to check during testing whether code is deterministic...
Software vulnerability is the major root of security issues which results in serious attacks such as DDOS and worms. How to find vulnerability especially on binaries has been an alluring but challenging topic. Traditional black-box fuzzing heavily relies on input format so that it cannot work on unknown formats, more severely, it cannot generate effective test cases because it randomly change input...
PXI is the expansion of PCI in instrument field. It has formed a rule of mechanism, electric and software which can be applied to the field of testing, measuring and data-sampling. The digital converter module of synchro resolver-to-digital converter converts analog angle signals into digital signals, then connects to computer by PXI. Thus the intelligence of the instrument can be realized. In this...
With the continuous development of embedded technology, embedded applications are becoming increasingly popular in daily lives, and respectively embedded software is in great demand. As a result, how to profile embedded software to guarantee its quality becomes a focus of attention. This paper focuses on this issue. It analyzes current methods of embedded software profiling and their defects, and...
This paper presents a Multi star simulator which is an embedded system used in the ground testing of Star sensors meant for the precision attitude control of satellites. This system shall not only simulate star intensities precisely, but also control them with changing temperature much easily. In this system microcontroller is interfaced with a personal computer (host controller monitoring all the...
The cache utilization seriously impacts on program performance, whereas the cache behavior is transparent to developers so that they cannot get opportunity to optimize their programs by reducing cache miss rates. This paper introduces a useful instrumentation tool, Cachebit, which is built with Crossbit - a dynamic binary translation (DBT) framework with intermediate instruction layer. Cachebit simulates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.