Abstract
Dynamically ensuring the correctness of the functional behavior of a real-time embedded system is tedious, especially in the autonomous domain. Even though the current real-time task model provides sufficient information to perform basic schedulability tests, it is inadequate to be used in runtime monitoring to assert and guarantee the correctness of a system under hardware/software malfunctions or malicious cyber attacks. In this article, we present a runtime monitoring approach based on a fine-grained model of real-time tasks.
- C. L. Liu and J. W. Layland, "Scheduling algorithms for multiprogramming in a hard-real-time environment," Journal of the ACM (JACM), vol. 20, no. 1, pp. 46--61, 1973.Google Scholar
Digital Library
- C. Ballabriga, H. Cassé, C. Rochange, and P. Sainrat, "Otawa: An open toolbox for adaptive wcet analysis," in IFIP International Workshop on Software Technolgies for Embedded and Ubiquitous Systems, pp. 35--46, 2010.Google Scholar
- F. Singhoff, J. Legrand, L. Nana, and L. Marcé, "Cheddar: a flexible real time scheduling framework," in Proceedings of the 2004 ACM SIGAda international conference, 2004.Google Scholar
Digital Library
Recommendations
Runtime verification of real-time embedded systems
EMSOFT '12: Proceedings of the tenth ACM international conference on Embedded softwareTime-triggered runtime verification aims at tackling two defects associated with runtime overhead: unboundedness and unpredictability. In this approach, a monitor runs in parallel with the program under inspection and periodically samples the program ...
Conforming the runtime inputs for hard real-time embedded systems
DAC '12: Proceedings of the 49th Annual Design Automation ConferenceTiming is an important concern when designing an embedded system. While lots of researches on hard real-time systems focus on design-time analysis, monitoring the corresponding runtime behaviors are seldom investigated. In this paper, we investigate the ...
Efficient Monitoring of Embedded Real-Time Systems
ITNG '08: Proceedings of the Fifth International Conference on Information Technology: New GenerationsVerification of time constraints in embedded real-time systems is particularly hard due to resource restrictions on the target hardware and lack of methods and support tools. In an attempt to overcome this last limitation, a monitoring approach based on ...






Comments