ACM Trans. Embed. Comput. Syst.最新文献

筛选
英文 中文
Introduction to Special Issue on Risk and Trust in Embedded Critical Systems 嵌入式关键系统风险与信任专题导论
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2659008
J. Rossebø, S. Houmb, Geri Georg, V. N. Franqueira, D. Serpanos
{"title":"Introduction to Special Issue on Risk and Trust in Embedded Critical Systems","authors":"J. Rossebø, S. Houmb, Geri Georg, V. N. Franqueira, D. Serpanos","doi":"10.1145/2659008","DOIUrl":"https://doi.org/10.1145/2659008","url":null,"abstract":"Society has become more and more dependent on critical infrastructures and the embedded computing systems that control them. The dependability of these critical systems, including requirements related to reliability, safety, and security, is of utmost importance and requires specific attention in all phases of the system lifecycle. These systems have traditionally been under strict control of the organization delivering and owning them and their continuous, predictable operation has been closely monitored and maintained. However, critical systems are increasingly connected to the Internet, to peer and vendor sites, or to regulatory bodies and their management and control is often outsourced. The notions of both a system and an organization are more diffuse as critical systems move towards cross-organizational and distributed control structures. No longer is one single organization in control of these systems, rather their dependability may now be affected by operations performed by a third party and security and trust becomes increasingly important and complex. This Risk and Trust in Embedded Critical Systems special issue of TECS focuses on some of the main security challenges facing embedded computing systems design and implementation. The articles in this special issue focus on design and implementation of trusted embedded systems. The first article, “Designing Trusted Embedded Systems from Finite State Machines” by Carson Dunbar and Gang Qu, presents an approach to addressing security and trust issues in sequential design using finite state machines. In the second article, “Combating Software and Sybil Attacks to Data Integrity in CrowdSourced Embedded Systems” by Dua et al., the authors investigate how a trusted sensing peripheral, consisting of a trusted platform module and sensors, can help defend crowd-sourced mobile embedded systems against attacks on data integrity.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Supporting Adaptive Fault-Tolerant Solutions 支持自适应容错解决方案的框架
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2629473
K. Siozios, D. Soudris, M. Hübner
{"title":"A Framework for Supporting Adaptive Fault-Tolerant Solutions","authors":"K. Siozios, D. Soudris, M. Hübner","doi":"10.1145/2629473","DOIUrl":"https://doi.org/10.1145/2629473","url":null,"abstract":"For decades, computer architects pursued one primary goal: performance. The ever-faster transistors provided by Moore's law were translated into remarkable gains in operation frequency and power consumption. However, the device-level size and architecture complexity impose several new challenges, including a decrease in dependability level due to physical failures. In this article we propose a software-supported methodology based on game theory for adapting the aggressiveness of fault tolerance at runtime. Experimental results prove the efficiency of our solution since it achieves comparable fault masking to relevant solutions, but with significantly lower mitigation cost. More specifically, our framework speeds up the identification of suspicious failure resources on average by 76% as compared to the HotSpot tool. Similarly, the introduced solution leads to average Power×Delay (PDP) savings against an existing TMR approach by 53%.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real-Time Power Management for Embedded M2M Using Intelligent Learning Methods 基于智能学习方法的嵌入式M2M实时电源管理
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2632158
Anand Paul
{"title":"Real-Time Power Management for Embedded M2M Using Intelligent Learning Methods","authors":"Anand Paul","doi":"10.1145/2632158","DOIUrl":"https://doi.org/10.1145/2632158","url":null,"abstract":"In this work, an embedded system working model is designed with one server that receives requests by a requester by a service queue that is monitored by a Power Manager (PM). A novel approach is presented based on reinforcement learning to predict the best policy amidst existing DPM policies and deterministic markovian nonstationary policies (DMNSP). We apply reinforcement learning, namely a computational approach to understanding and automating goal-directed learning that supports different devices according to their DPM. Reinforcement learning uses a formal framework defining the interaction between agent and environment in terms of states, response action, and reward points. The capability of this approach is demonstrated by an event-driven simulator designed using Java with a power-manageable machine-to-machine device. Our experiment result shows that the proposed dynamic power management with timeout policy gives average power saving from 4% to 21% and the novel dynamic power management with DMNSP gives average power saving from 10% to 28% more than already proposed DPM policies.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121987782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Multicopy Cache: A Highly Energy-Efficient Cache Architecture 多拷贝缓存:一种高能效的缓存架构
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2632162
Arup Chakraborty, H. Homayoun, A. Djahromi, N. Dutt, A. Eltawil, F. Kurdahi
{"title":"Multicopy Cache: A Highly Energy-Efficient Cache Architecture","authors":"Arup Chakraborty, H. Homayoun, A. Djahromi, N. Dutt, A. Eltawil, F. Kurdahi","doi":"10.1145/2632162","DOIUrl":"https://doi.org/10.1145/2632162","url":null,"abstract":"Caches are known to consume a large part of total microprocessor energy. Traditionally, voltage scaling has been used to reduce both dynamic and leakage power in caches. However, aggressive voltage reduction causes process-variation-induced failures in cache SRAM arrays, thus compromising cache reliability. We present MultiCopy Cache (MC2), a new cache architecture that achieves significant reduction in energy consumption through aggressive voltage scaling while maintaining high error resilience (reliability) by exploiting multiple copies of each data item in the cache. Unlike many previous approaches, MC2 does not require any error map characterization and therefore is responsive to changing operating conditions (e.g., Vdd noise, temperature, and leakage) of the cache. MC2 also incurs significantly lower overheads compared to other ECC-based caches. Our experimental results on embedded benchmarks demonstrate that MC2 achieves up to 60% reduction in energy and energy-delay product (EDP) with only 3.5% reduction in IPC and no appreciable area overhead.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128605023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Design and Analysis Framework for Thermal-Resilient Hard Real-Time Systems 热弹性硬实时系统的设计与分析框架
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2632154
P. Hettiarachchi, N. Fisher, Masud Ahmed, L. Wang, Shinan Wang, Weisong Shi
{"title":"A Design and Analysis Framework for Thermal-Resilient Hard Real-Time Systems","authors":"P. Hettiarachchi, N. Fisher, Masud Ahmed, L. Wang, Shinan Wang, Weisong Shi","doi":"10.1145/2632154","DOIUrl":"https://doi.org/10.1145/2632154","url":null,"abstract":"We address the challenge of designing predictable real-time systems in an unpredictable thermal environment where environmental temperature may dynamically change (e.g., implantable medical devices). Towards this challenge, we propose a control-theoretic design methodology that permits a system designer to specify a set of hard real-time performance modes under which the system may operate. The system automatically adjusts the real-time performance mode based on the external thermal stress. We show (via analysis, simulations, and a hardware testbed implementation) that our control design framework is stable and control performance is equivalent to previous real-time thermal approaches, even under dynamic temperature changes. A crucial and novel advantage of our framework over previous real-time control is the ability to guarantee hard deadlines even under transitions between modes. Furthermore, our system design permits the calculation of a new metric called thermal resiliency that characterizes the maximum external thermal stress that any hard real-time performance mode can withstand. Thus, our design framework and analysis may be classified as a thermal stress analysis for real-time systems.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123987328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems 在众包嵌入式系统中打击对数据完整性的软件和Sybil攻击
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2629338
A. Dua, N. Bulusu, Wu-chang Feng, W. Hu
{"title":"Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems","authors":"A. Dua, N. Bulusu, Wu-chang Feng, W. Hu","doi":"10.1145/2629338","DOIUrl":"https://doi.org/10.1145/2629338","url":null,"abstract":"Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applications, including transportation, emergency response and eHealth. Data integrity becomes imperative as malicious participants can launch software and Sybil attacks modifying the sensing platform and data. To address these attacks, we develop (1) a Trusted Sensing Peripheral (TSP) enabling collection of high-integrity raw or aggregated data, and participation in applications requiring additional modalities; and (2) a Secure Tasking and Aggregation Protocol (STAP) enabling aggregation of TSP trusted readings by untrusted intermediaries, while efficiently detecting fabricators. Evaluations demonstrate that TSP and STAP are practical and energy-efficient.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117268865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Hybrid Storage Access Framework for High-Performance Virtual Machines 高性能虚拟机的混合存储访问框架
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2660493
Chih-Kai Kang, Yu-Jhang Cai, Chin-Hsien Wu, P. Hsiu
{"title":"A Hybrid Storage Access Framework for High-Performance Virtual Machines","authors":"Chih-Kai Kang, Yu-Jhang Cai, Chin-Hsien Wu, P. Hsiu","doi":"10.1145/2660493","DOIUrl":"https://doi.org/10.1145/2660493","url":null,"abstract":"In recent years, advances in virtualization technology have enabled multiple virtual machines to run on a physical machine, such that each virtual machine can perform independently with its own operating system. The IT industry has adopted virtualization technology because of its ability to improve hardware resource utilization, achieve low-power consumption, support concurrent applications, simplify device management, and reduce maintenance costs. However, because of the hardware limitation of storage devices, the I/O capacity could cause performance bottlenecks. To address the problem, we propose a hybrid storage access framework that exploits solid-state drives (SSDs) to improve the I/O performance in a virtualization environment.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimal Priority Assignment to Control Tasks 控制任务的最优优先级分配
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2660496
Giulio M. Mancuso, Enrico Bini, G. Pannocchia
{"title":"Optimal Priority Assignment to Control Tasks","authors":"Giulio M. Mancuso, Enrico Bini, G. Pannocchia","doi":"10.1145/2660496","DOIUrl":"https://doi.org/10.1145/2660496","url":null,"abstract":"In embedded real-time systems, task priorities are often assigned to meet deadlines. However, in control tasks, a late completion of a task has no catastrophic consequence; rather, it has a quantifiable impact in the control performance achieved by the task.\u0000 In this article, we address the problem of determining the optimal assignment of priorities and periods of sampled-data control tasks that run over a shared computation unit. We show that the minimization of the overall cost can be performed efficiently using a branch and bound algorithm that can be further speeded up by allowing for a small degree of suboptimality. Detailed numerical simulations are presented to show the advantages of various branching alternatives, the overall algorithm effectiveness, and its scalability with the number of tasks.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Introduction to the Special Issue on Virtual Prototyping of Parallel and Embedded Systems (ViPES) 并行与嵌入式系统虚拟样机(ViPES)特刊简介
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2675739
D. Göhringer
{"title":"Introduction to the Special Issue on Virtual Prototyping of Parallel and Embedded Systems (ViPES)","authors":"D. Göhringer","doi":"10.1145/2675739","DOIUrl":"https://doi.org/10.1145/2675739","url":null,"abstract":"","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123528757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing Trusted Embedded Systems from Finite State Machines 基于有限状态机的可信嵌入式系统设计
ACM Trans. Embed. Comput. Syst. Pub Date : 2014-12-15 DOI: 10.1145/2638555
Carson Dunbar, G. Qu
{"title":"Designing Trusted Embedded Systems from Finite State Machines","authors":"Carson Dunbar, G. Qu","doi":"10.1145/2638555","DOIUrl":"https://doi.org/10.1145/2638555","url":null,"abstract":"Sequential components are crucial for a real-time embedded system as they control the system based on the system's current state and real life input. In this article, we explore the security and trust issues of sequential system design from the perspective of a finite state machine (FSM), which is the most popular model used to describe sequential systems. Specifically, we find that the traditional FSM synthesis procedure will introduce security risks and cannot guarantee trustworthiness in the implemented circuits. Indeed, we show that not only do there exist simple and effective ways to attack a sequential system, it is also possible to insert a hardware Trojan Horse into the design without introducing any significant design overhead. We then formally define the notion of trust in FSM and propose a novel approach to designing trusted circuits from the FSM specification. We demonstrate both our findings on the security threats and the effectiveness of our proposed method on Microelectronics Center of North Carolina (MCNC) sequential circuit benchmarks.","PeriodicalId":183677,"journal":{"name":"ACM Trans. Embed. Comput. Syst.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信