Handbook of theoretical computer science (vol. B)
backus normal form vs. Backus Naur form
Communications of the ACM
An Implicit Prioritized Access Protocol for Wireless Sensor Networks
RTSS '02 Proceedings of the 23rd IEEE Real-Time Systems Symposium
Java-MaC: A Run-Time Assurance Approach for Java Programs
Formal Methods in System Design
Æthereal Network on Chip: Concepts, Architectures, and Implementations
IEEE Design & Test
Finding application errors and security flaws using PQL: a program query language
OOPSLA '05 Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Scheduling and memory requirements analysis with AADL
Proceedings of the 2005 annual ACM SIGAda international conference on Ada: The Engineering of Correct and Reliable Software for Real-Time & Distributed Systems using Ada and Related Technologies
Predator: a predictable SDRAM memory controller
CODES+ISSS '07 Proceedings of the 5th IEEE/ACM international conference on Hardware/software codesign and system synthesis
Mop: an efficient and generic runtime verification framework
Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems and applications
Making trace monitors feasible
Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems and applications
Integrating Product-Line Fault Tree Analysis into AADL Models
HASE '07 Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium
From the prototype to the final embedded system using the Ocarina AADL tool suite
ACM Transactions on Embedded Computing Systems (TECS)
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation
EDCC-7 '08 Proceedings of the 2008 Seventh European Dependable Computing Conference
Predictable programming on a precision timed architecture
CASES '08 Proceedings of the 2008 international conference on Compilers, architectures and synthesis for embedded systems
Hardware Runtime Monitoring for Dependable COTS-Based Real-Time Embedded Systems
RTSS '08 Proceedings of the 2008 Real-Time Systems Symposium
The System-Level Simplex Architecture for Improved Real-Time Embedded System Safety
RTAS '09 Proceedings of the 2009 15th IEEE Symposium on Real-Time and Embedded Technology and Applications
RTA'03 Proceedings of the 14th international conference on Rewriting techniques and applications
Schedulability analysis of AADL models
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
PRP: priority rollback protocol -- a PIP extension for mixed criticality systems: short paper
Proceedings of the 8th International Workshop on Java Technologies for Real-Time and Embedded Systems
Load-based schedulability analysis of certifiable mixed-criticality systems
EMSOFT '10 Proceedings of the tenth ACM international conference on Embedded software
Hard-real-time scheduling of data-dependent tasks in embedded streaming applications
EMSOFT '11 Proceedings of the ninth ACM international conference on Embedded software
EMSOFT '11 Proceedings of the ninth ACM international conference on Embedded software
Runtime verification of microcontroller binary code
Science of Computer Programming
Implementation and evaluation of mixed-criticality scheduling approaches for sporadic tasks
ACM Transactions on Embedded Computing Systems (TECS)
Hi-index | 0.00 |
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded systems, but it poses significant challenges from a design and verification point of view. In particular, in a mixed-criticality system, low criticality applications must be prevented from interfering with high criticality ones. In this paper, we introduce a new design methodology for SoC that provides strong isolation guarantees to applications with different criticalities. A set of certificates describing the assumed application behavior is extracted from a functional Architectural Analysis and Design Language (AADL) specification. Our tools then automatically generate hardware wrappers that enforce at run-time the behavior described by the certificates. In particular, we employ run-time monitoring to formally check all data communication in the system, and we enforce timing reservations for both computation and communication resources. Verification is greatly simplified because certificates are much simpler than the components used to implement low-criticality applications. The effectiveness of our methodology is proven on a case study consisting of a medical pacemaker.