{"title":"Possible risks with EVT-based timing analysis: an experimental study on a multi-core platform","authors":"J. Vasconcelos, George Lima","doi":"10.1109/SBESC56799.2022.9964853","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964853","url":null,"abstract":"Hardware architectures equipped with multiple cores, cache memory and branch prediction usually preclude the application of classical methods for determining execution time bounds for real-time tasks. As such bounds are fundamental in the designing of real-time system, Measurement-Based Probabilistic Timing Analysis (MBPTA) has been employed. A common choice is towards the derivation of probabilistic Worst-Case Execution Time (pWCET) via the use of Extreme Value Theory (EVT), a branch of statistics for modeling the maximum of a random variable. However, pWCET estimations are usually reported taking a controlled or simulated environment. In this paper we rather apply MBPTA in a real multi-core platform, namely Raspberry Pi 3B, taking into consideration possible interference due to operating system and concurrent activities. The found results indicate that although EVT is a robust technique, it does not always produce adequate models and coherent pWCET estimations. As MBPTA is primarily called for when classical methods are not applicable, as it is the case for the studied platform, the results reported in this paper highlight possible risks in when applying MBPTA for pWCET estimations.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114962202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leonardo Francis, Victor Elízio Pierozan, G. Gracioli, G. Araújo
{"title":"Data-driven Anomaly Detection of Engine Knock based on Automotive ECU","authors":"Leonardo Francis, Victor Elízio Pierozan, G. Gracioli, G. Araújo","doi":"10.1109/SBESC56799.2022.9965059","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9965059","url":null,"abstract":"In the automotive industry, the study of internal combustion engines (ICE) has massively been studied to identify the occurrence of some failures, such as engine knock [1], [2]. The occurrence of this phenomenon on the engine directly affects the engine maintenance cost and longer engine life. The use of machine learning for failure detection is highlighted [3]–[6]. An investigation was carried out by performing experiments with a Renault Sandero car, collecting some sets of variables for batch analysis. In this paper, we use artificial intelligence techniques with a data-driven approach, more specifically, machine learning, to detect the phenomenon of engine knock. The investigation was conducted with a feature extraction classifier, AutoEnconder Dense and Convolutional, SVM, and Isolated Forest. Finally, the best result achieved was 81% considering a feature extraction classifier on the collection of variables defined.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luiz Fernando Altran, Guilherme Galante, M. Oyamada
{"title":"Label-affinity-Scheduler: Considering Business Requirements in Container Scheduling for Multi-Cloud and Multi-Tenant Environments","authors":"Luiz Fernando Altran, Guilherme Galante, M. Oyamada","doi":"10.1109/SBESC56799.2022.9964784","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964784","url":null,"abstract":"The goal of this paper is to present a scheduling strategy that addresses a set of customer-specific business requirements when deploying containers, targeting multi-user and multi-cloud environments. This is done by extending the label scheme used to specify attributes for compute nodes and requirements for applications, and by associating workloads to the nodes with the highest affinity. The proposal is validated by implementing a custom scheduler for Kubernetes orchestrator. The custom scheduler was validated in an environment consisting of 25 nodes distributed across 4 providers with different hardware configurations and geographical locations. The results confirm the effectiveness of our scheduler in different scenarios, granting the business requirements assigned to each application.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LLVM-ACT: Profiling Based Tool for Approximate Computing Technique Selection","authors":"Lavinia Miranda, M. Pereira, Jorgiano Vidal","doi":"10.1109/SBESC56799.2022.9965085","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9965085","url":null,"abstract":"Approximate Computing is currently an emerging paradigm that seeks to replace some data accuracy with aspects such as performance and energy efficiency. There are tools within this scope that apply some approximate computation techniques at software computational level. However, these tools are limited in a way that they only cover some specific scope, apply only one of the known techniques and/or need manual code annotations to work out. Thus, this work proposes the implementation of a tool that, according to the application profiling, chooses the most appropriate approximate computing technique to be applied. LLVM-ACT uses the LLVM compilation infrastructure, where each step is implemented as a code analysis or transformation LLVM Pass. The results show that the technique chosen by LLVM-ACT is cost-effective if low error rates and high speedup are taken into account, with an 8x speedup with 22% error rate on average with the Fluidanimate application.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rodrigo M. Sokulski, P. C. Santos, Sairo R. dos Santos, M. Alves
{"title":"SAPIVe: Simple AVX to PIM Vectorizer","authors":"Rodrigo M. Sokulski, P. C. Santos, Sairo R. dos Santos, M. Alves","doi":"10.1109/SBESC56799.2022.9964539","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964539","url":null,"abstract":"Larger vector extensions are one of the commonly used techniques to meet the growing demands from computational systems. These extensions, capable of operating over multiple data elements with a single instruction, exert a lot of pressure on the memory hierarchy, increasing the impact of growing problems such as Memory-Wall and von Neumann bottleneck. An alternative to work around these problems would be adding processing elements close to the memory, known as Processing-In-Memory (PIM). As with processor vector extensions, the most efficient PIM techniques use in-memory vector processing units. There are several ways to convert a code into in-memory vector processing, such as binary hardware translation, which may not depend on programmers or adapted software and can be carried out transparently to its users. However, in the context of in-memory processing, this conversion technique presents some challenges related to the PIM instructions format and the structure of the loops present in each application. Thus, this article proposes and evaluates Simple AVX to PIM Vectorizer (SAPIVe), a hardware binary translation mechanism from processor vector instructions into in-memory vector instructions, which, in addition to processing more data, also performs loads, operations, and stores at once. Our results show that our mechanism can accelerate kernels up to 5 times with possible performance losses prevented using loop predictors.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tolerating Resource Exhaustion Attacks in the Time-Triggered Architecture","authors":"Mohammad Ibrahim Alkoudsi, G. Fohler, M. Völp","doi":"10.1109/SBESC56799.2022.9964703","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964703","url":null,"abstract":"The Time-Triggered Architecture (TTA) presents a blueprint for building safe and real-time constrained distributed systems, based on a set of orthogonal concepts that make extensive use of the availability of a globally consistent notion of time and a priori knowledge of events. Although the TTA tolerates arbitrary failures of any of its nodes by architectural means (active node replication, a membership service, and bus guardians), the design of these means considers only accidental faults. However, distributed safety- and real-time critical systems have been emerging into more open and interconnected systems, operating autonomously for prolonged times and interfacing with other possibly non-real-time systems. Therefore, the existence of vulnerabilities that adversaries may exploit to compromise system safety cannot be ruled out. In this paper, we discuss potential targeted attacks capable of bypassing TTA's fault-tolerance mechanisms and demonstrate how two well-known recovery techniques - proactive and reactive rejuvenation - can be incorporated into TTA to reduce the window of vulnerability for attacks without introducing extensive and costly changes.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benedikt Jung, Christian Eichler, Jonas Röckl, R. Schlenk, Timo Hönig, Tilo Müller
{"title":"Trusted Monitor: TEE-Based System Monitoring","authors":"Benedikt Jung, Christian Eichler, Jonas Röckl, R. Schlenk, Timo Hönig, Tilo Müller","doi":"10.1109/SBESC56799.2022.9964869","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964869","url":null,"abstract":"As trusted computing becomes increasingly important, Trusted Execution Environments (TEEs) see more widespread use. A particular high demand for security arises in the context of embedded systems in critical infrastructures. We present a novel intrusion detection system called the Trusted Monitor (TM) that protects its integrity even in the presence of a system-level attacker by running inside the ARM TrustZone TEE. The TM constantly monitors the system using hardware performance counters and detects intrusions based on the classification by an application-specific machine learning model. Our evaluation shows that the TM correctly classifies 86% of 183 evaluated workloads, while the performance overhead stays below 2%. In particular, we show that a real-world kernel-level rootkit observably influences the hardware performance counters and, thus, can be detected.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benedict Herzog, S. Reif, Fabian Hügel, Wolfgang Schröder-Preikschat, Timo Hönig
{"title":"Bears: Building Energy-Aware Reconfigurable Systems","authors":"Benedict Herzog, S. Reif, Fabian Hügel, Wolfgang Schröder-Preikschat, Timo Hönig","doi":"10.1109/SBESC56799.2022.9964629","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964629","url":null,"abstract":"Energy efficiency has developed to one of the most important non-functional system properties. One keystone to building an energy-efficient system is the right system configuration, which is tailored to the currently running application and hardware. Finding such a right system configuration manually, however, is a complex and often unfeasible task due to the vast configuration space on the one side and the required hardware and application knowledge on the other side. This paper presents and refines an approach to automatically identify and select energy-efficient configurations in re-configurable systems. The approach relies on different machine-learning techniques and achieves energy efficiency improvements of up to 10.8 % out of 13.3 % by automatically adapting the system configuration on a Linux system. Additionally, we analyse the application knowledge required for selecting the configuration and make a proposal how to generate sufficient training data.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
André F. Pastório, F. Spanhol, L. Martins, E. T. Camargo
{"title":"A Machine Learning-Based Approach to Calibrate Low-Cost Particulate Matter Sensors","authors":"André F. Pastório, F. Spanhol, L. Martins, E. T. Camargo","doi":"10.1109/SBESC56799.2022.9964983","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964983","url":null,"abstract":"Low-cost particulate matter (LC-PM) sensors have been studied around the world as a viable alternative to expensive reference stations for monitoring air quality. However, LC-PM sensors require periodic calibration, since their data are often inaccurate and subject to uncertainty. Sensors calibration can be performed through machine learning methods where the sensor is placed in a real environment subject to the local environmental conditions of the place and its measurement compared to a reference equipment. This work evaluates different machine learning methods in five different models of LC-PM sensors, aiming to select the most appropriate sensor and a calibration method to be used in a low-cost air quality station in the context of smart cities.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Runtime Verification in Real-Time Systems with FreeRTOS","authors":"E. Broering, L. Becker","doi":"10.1109/SBESC56799.2022.9964952","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964952","url":null,"abstract":"Runtime Verification (RV) is a lightweight and dynamic technique that checks the current execution of the system through structures called monitors and produces a verdict on whether or not this execution satisfies a certain property of the system correction. Pedro et.al. developed a framework for performing RV of bare-metal real-time embedded systems (RTS). It consists of a tool for automatic synthesizing C++11 targeted monitors and a runtime library to support docking monitors on bare metal boards. The framework is capable of handling explicit time and durations, two of the essential concepts for anomaly detection of hard real-time systems. A limitation of this tool is that it only follows the POSIX standard. However, many real-time bare-metal embedded system applications do not support this architecture, such as those using FreeRTOS. This work aims to complement such work. Its goal is to update the RV process, making an adaptation for using it in non-POSIX RTOS, such as the FreeRTOS. The paper details the proposed system, also presenting a study to analize the scheduling feasibility of a real-time task set.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}