Low-level trace correlation on heterogeneous embedded systems
نویسندگان
چکیده
منابع مشابه
Low-level trace correlation on heterogeneous embedded systems
Tracing is a common method used to debug, analyze, and monitor various systems. Even though standard tools and tracing methodologies exist for standard and distributed environments, it is not the case for heterogeneous embedded systems. This paper proposes to fill this gap and discusses how efficient tracing can be achieved without having common system tools, such as the Linux Trace Toolkit (LT...
متن کاملModel Level Coupling of Heterogeneous Embedded Systems
The integration platform GeneralStore is a tool that assists an integrated development process starting with a model and ending with executable code. The software features coupling of subsystems from different modeling domains on model level. From the coupled model it generates a running prototype by code generation. In addition to object-oriented system modeling for software components in embe...
متن کاملSystem-Level Co-design of Heterogeneous Multiprocessor Embedded Systems
Progettazione concorrente hw/sw di sistemi dedicati multiprocessore valuable experience and the unconstrained help that they have provided to me. Moreover, I would like to thank all the students that I had the opportunity to work with and that have been a valuable support in many occasions. I would especially like to mention Luca Del Vecchio, Azzurra Persico and Aldo Vico. Finally, I would like...
متن کاملIssues in Heterogeneous Embedded Systems
The recent accelerated development of scalable computing systems has made possible the coordinated use of a suite of High Performance Computing (HPC) components for computationally demanding problems in embedded applications. These emerging Scalable Heterogeneous High Performance Embedded (SHHiPE) systems are designed using commercial-oo-the-shelf (COTS) modules. Our current interest is to empl...
متن کاملAPI-Level Attacks on Embedded Systems
A whole new family of attacks has recently been discovered on the application programming interfaces (APIs) used by security processors. These extend and generalise a number of attacks already known on authentication protocols. The basic idea is that by presenting valid commands to the security processor, but in an unexpected sequence, it is possible to obtain results that break the security po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Embedded Systems
سال: 2017
ISSN: 1687-3963
DOI: 10.1186/s13639-016-0067-1