نتایج جستجو برای: run time verification
تعداد نتایج: 2009787 فیلتر نتایج به سال:
The growing complexity makes more complicated the development of embedded software for control systems if a rigorous engineering approach towards embedded software development is not used, i.e. component-based design and verification of embedded software. Exhaustively checking of real-time behavior in embedded systems is computationally intractable, therefore assurance of services and safe syst...
Cyber-Physical Systems (CPS) are increasingly utilizing advances in wireless mesh networking among computing nodes to facilitate communication and control for distributed applications. Factors such as interference or node mobility cause such wireless networks to experience changes in both topology and link capacities. These dynamic networks pose a reliability concern for high-criticality or mix...
abstract profile monitoring in statistical quality control has attracted attention of many researchers recently. a profile is a function between response variables and one or more independent variables. there have been only a limited number of researches on monitoring multivariate profiles. indeed, monitoring correlated multivariate profiles is a new subject in the fileld of statistical process...
Embedded cores are being increasingly used in the design of large system-on-a-chip (SoC). Because of the high complexity of SoC, the design verification is a challenge for system integrators. To reduce the verification complexity, the port-order fault (POF) model was proposed. It has been used for verifying core-based designs and the corresponding verification pattern generation has been develo...
(2011). Run-time security traceability for evolving systems. Security-critical systems are challenging to design and implement correctly and securely. A lot of vulnerabilities have been found in current software systems both at the specification and the implementation levels. This paper presents a comprehensive approach for model-based security assurance. Initially, it allows one to formally ve...
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification). We present a run-time security monitor that detects both known and unknown cyber attacks by checking that the run-time behavior of the application i...
This paper describes a technique for integrating run time compilation which is e ectively pause free and for which the worst case impact can be bounded Three extensions to a JVM implementation are used Firstly a new scheduler allows the allocation of CPU time to threads to be controlled Secondly a code generator provides a mechanism for run time compilation Finally a control interface allow app...
Task scheduling is one of the main challenges in every system design, and especially in embedded systems design. Task scheduling might be classified in two broad categories: (1) compile time (static scheduling) or (2) run time (dynamic scheduling). Recently there has been a growing interest in the development of run-time scheduling techniques for platform-based designs [1][2]. This interest is ...
Stack Smashing Attacks Arash Baratloo and Navjot Singh farash,[email protected] Bell Labs Research, Lucent Technologies 600 Mountain Ave Murray Hill, NJ 07974 USA Timothy Tsai [email protected] Reliable Software Technologies 21351 Ridgetop Circle, Suite 400 Dulles, VA 20166 USA Abstract The exploitation of bu er over ow vulnerabilities in process stacks constitutes a signi cant port...
The complexity of software systems has reached the point where we need run-time mechanisms that can be used to provide fault management services. Testing and verification may not cover all possible scenarios that a system can encounter, hence a simpler, yet formally specified run-time monitoring, diagnosis, and fault mitigation architecture is needed to increase the software system’s dependabil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید