Characterization of COTS Microkernel-based Systems using MAFALDA
|
|
- Steven Atkins
- 6 years ago
- Views:
Transcription
1 Characterization of COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre LAAS-CNRS Toulouse, France IFIP Working Group 1.4 Meeting Paraty, Brazil March 1-3, 21
2 Problem statement Building executive supports for dependable systems, two options: Development from scratch is complex & expensive Use of commercial components is questionable Main tendency for embedded systems Use of COTS componentized microkernels Define a specific instance for the application System development : two options syn sch mem com syn sch new com application Microkernel instance application Middleware layer Microkernel instance
3 Outline The objectives of MAFALDA MAFALDA in action Experimental results Lessons learnt
4 Objectives of MAFALDA Characterization by SWIFI (S/W Implemented Fault Injection) Identification of failure modes Evaluation of error detection coverage Identification of propagation channels Assessment of interface robustness MAFALDA Microkernel Assessment by Fault injection AnaLysis and Design Aid Wrapping framework Definition of formal wrappers Definition of a reflective implementation framework Application to both white-box & black-box candidates Rack of target machines Evaluation of the wrapped microkernel instance Host Machine controlling the experiments
5 Application Corruption Wp i Failure modes Wp j Application Oracle! Application failure " Erroneous results " Application hang Application / middleware Propagation API Error Microkernel! Internal System hang Corruption! Internal detection Error Propagation " Error Status " Exceptions µkci µkcj S e v e r i t y
6 Fault injection experiment
7 Sample of measures
8 Campaigns Microkernels Candidates: " Chorus Classix r3.1 (Kernel API), " Lynx OS v 3..1 (Kernel/Posix API) Components: " Synchronisation (semaphores) " Memory (protected regions) " Communication (message passing) " Scheduling (preemptive FIFO) Campaign parameters Same workload mapped on two different APIs Running on the same Pentium-based platform Between 1 to 3 experiments for each component All components targeted Both microkernel and parameters fault injection experiments
9 Chorus vs. LynxOS Code segment fault injection Synchronisation Kernel Scheduling Fail Syst. Chorus Classix r3.1 LynxOS r 3..1 Exception Error Status No Obs
10 Chorus vs. LynxOS Code segment fault injection Communication Chorus Classix r3.1 LynxOS r Kernel Fail 8 Syst. Exception Error Status No Obs 7 6 Memory
11 Chorus vs. LynxOS Parameter fault injection API Synchronisation Kernel Memory Fail Syst. Chorus Classix r3.1 LynxOS r 3..1 Exception Error Status No Obs
12 Chorus vs. LynxOS Parameter fault injection Chorus Classix r3.1 LynxOS r 3..1 Communication API Kernel 2 1 Fail * * Syst. Exception Error Status No Obs Similar behavior, except that a system call with given parameters can hang the application or even the kernel
13 Chorus vs. LynxOS Parameter fault injection Chorus Classix r3.1 LynxOS r 3..1 Communication API Kernel 2 1 Fail * * Syst. Exception Error Status No Obs int portmigrate (options, srcactorcap, portli, dstactorcap, seqnum) int portdelete (actorcap, portli) KnCap
14 Running mode impact Downloading application code into kernel space (Synchronisation workload) User mode Kernel mode No Obs 28.5% Undetected 9% 6% Syst. 1.4% No Obs 35.9% Undetected 41,5% Error status 3% Exception 38.1% KDB 13.9% Exception 21.1%.4% Syst..3% KDB,8% Code segment fault injection experiments carried out on Chorus Classix r 3.1
15 Detailed system call analysis Kernel call Parameter number Type Activated faults Application failure Application hang Exception Error status No observation GetPriority SetPriority int which int pid int which int pid int prio % % 64 3.% % % % 3 1.7% % % %.%.% 79.3% 7.8% Total % 3.3% % % Most of individual cases can be analysed Examples: " Priority out-of-bounds (Error status) " Invalid priority (Application failure) Possible conclusions: " The corrupted input value can be detected (assertion missing) " The corrupted input is valid for the kernel and cannot be checked (to be checked at the application/middleware level) The input space is randomly corrupted (sometimes all bits)
16 Some Lessons learnt Interpretation of results " One campaign : a microkernel instance + an activation profile " Variability of results: stand-alone vs. Posix-based version Raw data analysis reactive vs. static application " Analysis of logged data precise analysis of faulty situations " User-defined semantics of the failure modes Integrator s vs. supplier s viewpoint " Integrator: weaknesses revealed ED mechanisms (wrappers) " Supplier: bugs not yet revealed product improvement Target system evolution " A slightly new instance new campaign needed " Is the new release/version acceptable?
Building Dependable COTS Microkernel-based Systems using MAFALDA
Building Dependable COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre, Manuel Rodríguez, Jean Arlat, Frédéric Salles and Jean-Michel Sizun LAAS-CNRS Toulouse, France PRDC-2000, UCLA, Los
More informationDBench Project (Dependability Benchmarking)
DBench Project (Dependability Benchmarking) European IST Program IST-2000-25425 Karama Kanoun 39th Meeting IFIP Working Group 10.4 Paraty, Brazil 28 February- 3 March, 2001 Consortium! Partners Chalmers
More informationCharacterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel
IEEE/IFIP International Conference on Dependable Systems and Networks Florence, Italy, June 28-July 1, 2004 Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel Arnaud
More informationFailure analysis of an ORB in presence of faults
DSoS Failure analysis of an ORB in presence of faults Report Version: Deliverable IC3 Report Preparation Date: 1 October 2001 Classification: Public Circulation Contract Start Date: 1 April 2000 Duration:
More informationWorkshop on Dependability Benchmarking. 39th Meeting of IFIP Working Group 10.4, Parati, Brazil, March 1-3, 2001
Workshop on Dependability Benchmarking 39th Meeting of IFIP Working Group 10.4, Parati, Brazil, March 1-3, 2001 Wrap up Dependability benchmarking problem space Session 1 - Dependability Benchmarking Approaches
More informationAdaptive Fault Tolerant Systems: Reflective Design and Validation
1 Adaptive Fault Tolerant Systems: Reflective Design and Validation Marc-Olivier Killijian Dependable Computing and Fault Tolerance Research Group Toulouse - France 2 Motivations Provide a framework for
More informationREAL TIME OPERATING SYSTEM PROGRAMMING-I: VxWorks
REAL TIME OPERATING SYSTEM PROGRAMMING-I: I: µc/os-ii and VxWorks Lesson-1: RTOSes 1 1. Kernel of an RTOS 2 Kernel of an RTOS Used for real-time programming features to meet hard and soft real time constraints,
More informationFault Isolation for Device Drivers
Fault Isolation for Device Drivers 39 th International Conference on Dependable Systems and Networks, 30 June 2009, Estoril Lisbon, Portugal Jorrit N. Herder Vrije Universiteit Amsterdam ~26% of Windows
More informationOutline. Introduction. Survey of Device Driver Management in Real-Time Operating Systems
Survey of Device Driver Management in Real-Time Operating Systems Sebastian Penner +46705-396120 sebastian.penner@home.se 1 Outline Introduction What is a device driver? Commercial systems General Description
More informationIntroduction to Dynamic Analysis
Introduction to Dynamic Analysis Reading assignment Gary T. Leavens, Yoonsik Cheon, "Design by Contract with JML," draft paper, http://www.eecs.ucf.edu/~leavens/jml//jmldbc.pdf G. Kudrjavets, N. Nagappan,
More information18-642: Testing Overview
18-642: Testing Overview 9/25/2017 "In September of 1962, a news item was released stating that an $18 million rocket had been destroyed in early flight because "a single hyphen was left out of an instruction
More informationCHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating system? A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness An Extended Machine
More informationXception fault injection and robustness testing framework: a case-study of testing RTEMS
Xception fault injection and robustness testing framework: a case-study of testing RTEMS R. Maia 1, L. Henriques 1, R. Barbosa 1, D. Costa 1, H. Madeira 2 1 Critical Software SA Parque Industrial de Taveiro,
More informationAutomotive Software Security Testing
Detecting and Addressing Cybersecurity Issues V1.1 2018-03-05 Code ahead! 2 Automated vulnerability detection and triage + = 3 How did we get here? Vector was engaged with a large, US Tier 1 and we were
More informationLCCI (Large-scale Complex Critical Infrastructures)
LCCI (Large-scale Complex Critical Infrastructures) 1 LCCIs are Internet-scale constellations of heterogeneous systems glued together into a federated and open system by a data distribution middleware.
More informationObjectives. Chapter 19. Verification vs. validation. Topics covered. Static and dynamic verification. The V&V process
Objectives Chapter 19 Verification and Validation Assuring that a software system meets a user s need are to introduce software verification and validation (V&V) and to discuss the distinction between
More informationReal-Time Systems. Real-Time Operating Systems
Real-Time Systems Real-Time Operating Systems Hermann Härtig WS 2018/19 Outline Introduction Basic variants of RTOSes Real-Time paradigms Common requirements for all RTOSes High level resources Non-Real-Time
More informationPart 5. Verification and Validation
Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this
More informationQuantitative Treatment of Dependability of Real-Time Distributed Computing Systems. Questions from Workshop Co-Chairs
Quantitative Treatment of Dependability of Real-Time Distributed Computing Systems Kane Kim khkim@uci.edu, http://dream.eng.uci.edu/ For presentation at the Panel on Customer Point Of View On Dependability
More informationCommercial Real-time Operating Systems An Introduction. Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory
Commercial Real-time Operating Systems An Introduction Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory swamis@iastate.edu Outline Introduction RTOS Issues and functionalities LynxOS
More informationSoftware Techniques for Dependable Computer-based Systems. Matteo SONZA REORDA
Software Techniques for Dependable Computer-based Systems Matteo SONZA REORDA Summary Introduction State of the art Assertions Algorithm Based Fault Tolerance (ABFT) Control flow checking Data duplication
More informationBallista Design and Methodology
Ballista Design and Methodology October 1997 Philip Koopman Institute for Complex Engineered Systems Carnegie Mellon University Hamershlag Hall D-202 Pittsburgh, PA 15213 koopman@cmu.edu (412) 268-5225
More informationPOSIX in Real-Time. By Kevin M. Obenland 03/15/2001. Daniel Correia nºmec Carlos Guisado nºmec 49099
POSIX in Real-Time By Kevin M. Obenland 03/15/2001 Daniel Correia nºmec 18713 Carlos Guisado nºmec 49099 Posix. What is and why? The original Portable Operating System Interface for Computing Environments
More informationMONIKA HEINER.
LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V & V To
More informationFault Injection in the Automotive Standard ISO 26262: An Initial Approach
Fault Injection in the Automotive Standard ISO 26262: An Initial Approach Ludovic Pintard, Jean-Charles Fabre, Karama Kanoun, Michel Leeman, Matthieu Roy To cite this version: Ludovic Pintard, Jean-Charles
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should
More informationL4/Darwin: Evolving UNIX. Charles Gray Research Engineer, National ICT Australia
L4/Darwin: Evolving UNIX Charles Gray Research Engineer, National ICT Australia charles.gray@nicta.com.au Outline 1. Project Overview 2. BSD on the Mach microkernel 3. Porting Darwin to the L4 microkernel
More informationAn Approach to Specify and Test Component-Based Dependable Software
An Approach to Specify and Test Component-Based Dependable Software Arshad Jhumka, Martin Hiller, and Neeraj Suri Dept of Computer Engineering Chalmers University of Technology 412 96, Göteborg, Sweden
More informationError Sensitivity of Linux on PowerPC (G4) & Pentium (P4)
Error Sensitivity of Linux on PowerPC (G4) & Pentium (P4) W. Gu, Ravi K. Iyer Center for Reliable and High-Performance Computing Coordinated Science Laboratory University of Illinois at Urbana-Champaign
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 14 - Software Fault Tolerance I Chapter 4 Software Fault Tolerance Part.14.1 Causes of Software Errors Designing and
More informationSecond assignment came out Monday evening. Find defects in Hnefetafl rules written by your classmates. Topic: Code Inspection and Testing
Announcements Second assignment came out Monday evening Topic: Code Inspection and Testing Find defects in Hnefetafl rules written by your classmates Compare inspection, coverage testing, random testing,
More informationModel-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures
Model-Based Safety Approach for Early Validation of Integrated and Modular Avionics Architectures Marion Morel THALES AVIONICS S.A.S., 31036 Toulouse, France marion.morel@fr.thalesgroup.com Abstract. Increasing
More informationTesting. ECE/CS 5780/6780: Embedded System Design. Why is testing so hard? Why do testing?
Testing ECE/CS 5780/6780: Embedded System Design Scott R. Little Lecture 24: Introduction to Software Testing and Verification What is software testing? Running a program in order to find bugs (faults,
More informationBenchmarking The Dependability of Windows NT4, 2000 and XP *
Benchmarking The Dependability of Windows NT4, 2000 and XP * Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat LAAS-CNRS, 7, Avenue Colonel Roche 31077 Toulouse Cedex 4, France {kalakech, kanoun,
More informationTesting Methods: White Box Testing I
Testing Methods: White Box Testing I Outline Today we begin to look at white box testing We ll look at: white box vs black box role and kinds of white box testing implementation - source, executable and
More informationFault Injection Seminar
Fault Injection Seminar Summer Semester 2015 Daniel Richter, Lena Herscheid, Prof. Andreas Polze Operating Systems and Middleware Group Hasso Plattner Institute 23/04/2015 Fault Injection Seminar 1 Dependability
More informationWhy testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties
Why testing and analysis Software Testing Adapted from FSE 98 Tutorial by Michal Young and Mauro Pezze Software is never correct no matter what developing testing technique is used All software must be
More informationHIVE: Fault Containment for Shared-Memory Multiprocessors J. Chapin, M. Rosenblum, S. Devine, T. Lahiri, D. Teodosiu, A. Gupta
HIVE: Fault Containment for Shared-Memory Multiprocessors J. Chapin, M. Rosenblum, S. Devine, T. Lahiri, D. Teodosiu, A. Gupta CSE 598C Presented by: Sandra Rueda The Problem O.S. for managing FLASH architecture
More informationDarshan Institute of Engineering & Technology Unit : 9
1) Explain software testing strategy for conventional software architecture. Draw the spiral diagram showing testing strategies with phases of software development. Software Testing: Once source code has
More informationCREATIVE ASSERTION AND CONSTRAINT METHODS FOR FORMAL DESIGN VERIFICATION
CREATIVE ASSERTION AND CONSTRAINT METHODS FOR FORMAL DESIGN VERIFICATION Joseph Richards SGI, High Performance Systems Development Mountain View, CA richards@sgi.com Abstract The challenges involved in
More informationSimulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 The MathWorks, Inc. 1
Simulink 모델과 C/C++ 코드에대한매스웍스의정형검증툴소개 2012 The MathWorks, Inc. 1 Agenda Formal Verification Key concept Applications Verification of designs against (functional) requirements Design error detection Test
More informationFormal Technology in the Post Silicon lab
Formal Technology in the Post Silicon lab Real-Life Application Examples Haifa Verification Conference Jamil R. Mazzawi Lawrence Loh Jasper Design Automation Focus of This Presentation Finding bugs in
More informationLecture 15 Software Testing
Lecture 15 Software Testing Includes slides from the companion website for Sommerville, Software Engineering, 10/e. Pearson Higher Education, 2016. All rights reserved. Used with permission. Topics covered
More informationOutline Background Jaluna-1 Presentation Jaluna-2 Presentation Overview Use Cases Architecture Features Copyright Jaluna SA. All rights reserved
C5 Micro-Kernel: Real-Time Services for Embedded and Linux Systems Copyright 2003- Jaluna SA. All rights reserved. JL/TR-03-31.0.1 1 Outline Background Jaluna-1 Presentation Jaluna-2 Presentation Overview
More informationDMTCP: Fixing the Single Point of Failure of the ROS Master
DMTCP: Fixing the Single Point of Failure of the ROS Master Tw i n k l e J a i n j a i n. t @ h u s k y. n e u. e d u G e n e C o o p e r m a n g e n e @ c c s. n e u. e d u C o l l e g e o f C o m p u
More informationCommunication-Based Design
Communication-Based Design Motivation System-level verification of large component-oriented designs will be very costly. We cannot afford to debug interface mismatches between internal components... especially
More informationSoftware Robustness Testing Service
Software Robustness Testing Service http://www.ices.cmu.edu/ballista John P. DeVale devale@cmu.edu - (412) 268-4264 - http://www.ece.cmu.edu/~jdevale,qvwlwxwh IRU &RPSOH[ (QJLQHHUHG 6\VWHPV Overview: Ballista
More informationStatic program checking and verification
Chair of Software Engineering Software Engineering Prof. Dr. Bertrand Meyer March 2007 June 2007 Slides: Based on KSE06 With kind permission of Peter Müller Static program checking and verification Correctness
More informationHow to Harvest Reusable Components in Existing Software. Nikolai Mansurov Chief Scientist & Architect
How to Harvest Reusable Components in Existing Software Nikolai Mansurov Chief Scientist & Architect Overview Introduction Reuse, Architecture and MDA Option Analysis for Reengineering (OAR) Architecture
More informationAn Automated Testing Environment to support Operational Profiles of Software Intensive Systems
An Automated Testing Environment to support Operational Profiles of Software Intensive Systems Abstract: Robert S. Oshana Raytheon Systems Company oshana@raytheon.com (972)344-783 Raytheon Systems Company
More informationLecture 10: Introduction to Correctness
Lecture 10: Introduction to Correctness Aims: To look at the different types of errors that programs can contain; To look at how we might detect each of these errors; To look at the difficulty of detecting
More informationError Propagation Profiling of Operating Systems
Error Propagation Profiling of Operating Systems Andréas Johansson and Neeraj Suri Department of Computer Science, Technische Universität Darmstadt {aja,suri}@informatik.tu-darmstadt.de Abstract An Operating
More informationPushing the limits of CAN - Scheduling frames with offsets provides a major performance boost
Pushing the limits of CAN - Scheduling frames with offsets provides a major performance boost Nicolas NAVET INRIA / RealTime-at-Work http://www.loria.fr/~nnavet http://www.realtime-at-work.com Nicolas.Navet@loria.fr
More informationAUTOBEST: A microkernel-based system (not only) for automotive applications. Marc Bommert, Alexander Züpke, Robert Kaiser.
AUTOBEST: A microkernel-based system (not only) for automotive applications Marc Bommert, Alexander Züpke, Robert Kaiser vorname.name@hs-rm.de Outline Motivation AUTOSAR ARINC 653 AUTOBEST Architecture
More informationAUTOBEST: A United AUTOSAR-OS And ARINC 653 Kernel. Alexander Züpke, Marc Bommert, Daniel Lohmann
AUTOBEST: A United AUTOSAR-OS And ARINC 653 Kernel Alexander Züpke, Marc Bommert, Daniel Lohmann alexander.zuepke@hs-rm.de, marc.bommert@hs-rm.de, lohmann@cs.fau.de Motivation Automotive and Avionic industry
More informationIan Sommerville 2006 Software Engineering, 8th edition. Chapter 22 Slide 1
Verification and Validation Slide 1 Objectives To introduce software verification and validation and to discuss the distinction between them To describe the program inspection process and its role in V
More informationReal-Time Systems Hermann Härtig Real-Time Operating Systems Brief Overview
Real-Time Systems Hermann Härtig Real-Time Operating Systems Brief Overview 02/02/12 Outline Introduction Basic variants of RTOSes Real-Time paradigms Common requirements for all RTOSes High level resources
More informationCOS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Prof. Margaret Martonosi Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall11/cos318/ Outline Protection
More informationVerification and Validation
Verification and Validation Assuring that a software system meets a user's needs Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 19 Slide 1 Objectives To introduce software verification
More informationDesigning an Efficient and Extensible Robustness Benchmark of a Real-Time Operating System
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 1 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0008 Designing an Efficient and Extensible
More informationOn the Reliability of Correct Programs
On the Reliability of Correct Programs Marie-Claude Gaudel LRI, Université de Paris-Sud & CNRS April 2010 LAAS 1 Programs? Everybody knows what it is Let us try: A program is a piece of text in a (hopefully)
More informationWorkshop 1: Specification for SystemC-AADL interoperability
Workshop 1: System Design in Avionics & Space Specification for -AADL interoperability Eugenio Villar Eduardo de las Heras Microelectronic Engineering Group University of Cantabria Outline Motivations
More informationProcesses. Process Management Chapter 3. When does a process gets created? When does a process gets terminated?
Processes Process Management Chapter 3 1 A process is a program in a state of execution (created but not terminated) Program is a passive entity one on your disk (survivor.class, kelly.out, ) Process is
More informationData Backup for Mobile Nodes : a Cooperative Middleware and an Experimentation Platform
Data Backup for Mobile Nodes : a Cooperative Middleware and an Experimentation Platform Marc-Olivier Killijian Matthieu Roy Gaétan Séverac Christophe Zanon roy@laas.fr http://theresumeexperience.blogspot.com/
More informationAutomated Robustness Testing of Off-the-Shelf Software Components
Automated Robustness Testing of Off-the-Shelf Software Components Nathan Kropp Phil Koopman Dan Siewiorek Carnegie Mellon University http://www.ices.cmu.edu/ballista Institute for Complex Engineered Systems
More informationPrinciples of Multi-Level Reflection for Fault Tolerant Architectures
Principles of Multi-Level Reflection for Fault Tolerant Architectures François Taïani, Jean-Charles Fabre, Marc-Olivier Killijian LAAS-CNRS, 7, avenue du Colonel Roche, 31077 Toulouse Cedex 4, France {francois.taiani,
More informationSOFTWARE ENGINEERING. To discuss several different ways to implement software reuse. To describe the development of software product lines.
SOFTWARE ENGINEERING DESIGN WITH COMPONENTS Design with reuse designs and develops a system from reusable software. Reusing software allows achieving better products at low cost and time. LEARNING OBJECTIVES
More informationThe Real Time Thing. What the hack is real time and what to do with it. 22C3 30. December Erwin Erkinger e.at
The Real Time Thing What the hack is real time and what to do with it 22C3 30. December 2005 Erwin Erkinger vindaome@p e.at Content Part 1: Introduction the vocabulary and the concepts Part 2: Practical
More informationCOMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS
COMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS ZOLTÁN MICSKEI, ISTVÁN MAJZIK Department of Measurement and Information Systems Budapest University of Technology and Economics, Magyar Tudósok
More informationOS - Introduction Ezio Bartocci Institute for Computer Engineering
TECHNISCHE UNIVERSITÄT WIEN Fakultät für Informatik Cyber-Physical Systems Group OS - Introduction Ezio Bartocci Institute for Computer Engineering ezio.bartocci@tuwien.ac.at Operative System What is it?
More informationRobustness Testing of Autonomy Software
Robustness Testing of Autonomy Software Milda Zizyte, PhD Candidate advised by Dr. Philip Koopman, ECE dept. Casidhe Hutchison, Milda Zizyte, Patrick E. Lanigan, David Guttendorf, Michael Wagner, Claire
More informationDifférents cas d application de l'analyse Statique avec Frama-C dans un contexte industriel
Différents cas d application de l'analyse Statique avec Frama-C dans un contexte industriel DAS Systèmes Embarqués Agenda Use Case 1 Integrating Runtime Error Detection in the process with Frama-C Use
More informationCOS 318: Operating Systems
COS 318: Operating Systems OS Structures and System Calls Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Outline Protection mechanisms
More informationTesting Error Handling Code in Device Drivers Using Characteristic Fault Injection
1 Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection Jia-Ju Bai, Yu-Ping Wang, Jie Yin, Shi-Min Hu Department of Computer Science and Technology Tsinghua University Beijing,
More informationOperating System Architecture. CS3026 Operating Systems Lecture 03
Operating System Architecture CS3026 Operating Systems Lecture 03 The Role of an Operating System Service provider Provide a set of services to system users Resource allocator Exploit the hardware resources
More informationPart I: Preliminaries 24
Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................
More informationPorting AMS to RTEMS. Utilizing the Operating System Abstraction Layer (OSAL) David Edell
Porting AMS to RTEMS Utilizing the Operating System Abstraction Layer (OSAL) David Edell Overview What is AMS? VxWorks vs RTEMS What is OSAL? APL AMS Implementation (history) Porting to OSAL in VxWorks
More informationSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Simulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks Loïc FEJOZ, RealTime-at-Work (RTaW) Bruno REGNIER, CNES Philippe, MIRAMONT, CNES Nicolas
More informationTopic: Software Verification, Validation and Testing Software Engineering. Faculty of Computing Universiti Teknologi Malaysia
Topic: Software Verification, Validation and Testing Software Engineering Faculty of Computing Universiti Teknologi Malaysia 2016 Software Engineering 2 Recap on SDLC Phases & Artefacts Domain Analysis
More informationTowards an industrial use of FLUCTUAT on safety-critical avionics software
Towards an industrial use of FLUCTUAT on safety-critical avionics software David Delmas 1, Eric Goubault 2, Sylvie Putot 2, Jean Souyris 1, Karim Tekkal 3 and Franck Védrine 2 1. Airbus Operations S.A.S.,
More informationFaults, Errors, Failures
Faults, Errors, Failures CS 4501 / 6501 Software Testing [Ammann and Offutt, Introduction to Software Testing ] 1 Software Testing Review Testing = process of finding input values to check against a software
More informationCS 105, Spring 2015 Ring Buffer
CS 105, Spring 2015 Ring Buffer March 10, 2015 1 Introduction A ring buffer, also called a circular buffer, is a common method of sharing information between a producer and a consumer. In class, we have
More informationDeveloping AUTOSAR Compliant Embedded Software Senior Application Engineer Sang-Ho Yoon
Developing AUTOSAR Compliant Embedded Software Senior Application Engineer Sang-Ho Yoon 2015 The MathWorks, Inc. 1 Agenda AUTOSAR Compliant Code Generation AUTOSAR Workflows Starting from Software Component
More informationIn this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.
In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of
More informationOperating Systems Comprehensive Exam. Spring Student ID # 3/16/2006
Operating Systems Comprehensive Exam Spring 2006 Student ID # 3/16/2006 You must complete all of part I (60%) You must complete two of the three sections in part II (20% each) In Part I, circle or select
More informationAnalysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform
Analysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform YUNG-YUAN CHEN, CHUNG-HSIEN HSU, AND KUEN-LONG LEU + Department of Computer Science and Information Engineering Chung-Hua
More informationReal-time & Embedded Systems Programming. Advanced Operating Systems Lecture 7
Real-time & Embedded Systems Programming Advanced Operating Systems Lecture 7 Lecture Outline Ensuring predictable timing Embedded systems Constraints Interacting with hardware Device drivers Correctness
More informationVerification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process
Verification and Validation Assuring that a software system meets a user s needs Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 19,20 Slide 1
More informationReference Model and Scheduling Policies for Real-Time Systems
ESG Seminar p.1/42 Reference Model and Scheduling Policies for Real-Time Systems Mayank Agarwal and Ankit Mathur Dept. of Computer Science and Engineering, Indian Institute of Technology Delhi ESG Seminar
More informationTolerating Hardware Device Failures in Software. Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison
Tolerating Hardware Device Failures in Software Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison Current state of OS hardware interaction Many device drivers assume device
More informationCS 520 Theory and Practice of Software Engineering Fall 2018
Today CS 52 Theory and Practice of Software Engineering Fall 218 Software testing October 11, 218 Introduction to software testing Blackbox vs. whitebox testing Unit testing (vs. integration vs. system
More informationFROM SAFETY MODELS TO SECURITY MODELS: PRELIMINARY LESSONS LEARNT
1 / 22 FROM SAFETY MODELS TO SECURITY MODELS: PRELIMINARY LESSONS LEARNT Pierre Bieber Julien Brunel ONERA/DTIM, TOULOUSE, FRANCE THE FRENCH AEROSPACE LAB CONNECTED AIRCRAFT 2 / 22 CONNECTED AIRCRAFT :
More informationStatic and dynamic analysis: synergy and duality
Static and dynamic analysis: synergy and duality Michael Ernst MIT Computer Science & Artificial Intelligence Lab http://pag.csail.mit.edu/~mernst/ PASTE June 7, 2004 Michael Ernst, page 1 Goals Theme:
More informationOne Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple. Bit-Flip Errors
One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors Behrooz Sangchoolie *, Karthik Pattabiraman +, Johan Karlsson * * Department of Computer Science and Engineering,
More information6.033 Spring Lecture #6. Monolithic kernels vs. Microkernels Virtual Machines spring 2018 Katrina LaCurts
6.033 Spring 2018 Lecture #6 Monolithic kernels vs. Microkernels Virtual Machines 1 operating systems enforce modularity on a single machine using virtualization in order to enforce modularity + build
More informationOperating Systems. IV. Memory Management
Operating Systems IV. Memory Management Ludovic Apvrille ludovic.apvrille@telecom-paristech.fr Eurecom, office 470 http://soc.eurecom.fr/os/ @OS Eurecom Outline Basics of Memory Management Hardware Architecture
More informationClass average is Undergraduates are performing better. Working with low-level microcontroller timers
Student feedback Low grades of the midterm exam Class average is 86.16 Undergraduates are performing better Cheat sheet on the final exam? You will be allowed to bring one page of cheat sheet to the final
More informationUnit OS2: Operating System Principles. Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze
Unit OS2: Operating System Principles 2.5. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Copyright Notice 2000-2005 David A. Solomon and Mark
More informationAnnouncement. Exercise #2 will be out today. Due date is next Monday
Announcement Exercise #2 will be out today Due date is next Monday Major OS Developments 2 Evolution of Operating Systems Generations include: Serial Processing Simple Batch Systems Multiprogrammed Batch
More information