首页 > 最新文献

2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)最新文献

英文 中文
Possible risks with EVT-based timing analysis: an experimental study on a multi-core platform 基于evt的时序分析可能存在的风险:多核平台上的实验研究
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964853
J. Vasconcelos, George Lima
Hardware architectures equipped with multiple cores, cache memory and branch prediction usually preclude the application of classical methods for determining execution time bounds for real-time tasks. As such bounds are fundamental in the designing of real-time system, Measurement-Based Probabilistic Timing Analysis (MBPTA) has been employed. A common choice is towards the derivation of probabilistic Worst-Case Execution Time (pWCET) via the use of Extreme Value Theory (EVT), a branch of statistics for modeling the maximum of a random variable. However, pWCET estimations are usually reported taking a controlled or simulated environment. In this paper we rather apply MBPTA in a real multi-core platform, namely Raspberry Pi 3B, taking into consideration possible interference due to operating system and concurrent activities. The found results indicate that although EVT is a robust technique, it does not always produce adequate models and coherent pWCET estimations. As MBPTA is primarily called for when classical methods are not applicable, as it is the case for the studied platform, the results reported in this paper highlight possible risks in when applying MBPTA for pWCET estimations.
配备多核、高速缓存和分支预测的硬件架构通常排除了用于确定实时任务执行时间界限的经典方法的应用。由于这些边界是实时系统设计的基础,因此采用了基于测量的概率时序分析(MBPTA)。一种常见的选择是通过使用极值理论(EVT)来推导概率最坏情况执行时间(pWCET), EVT是统计学的一个分支,用于对随机变量的最大值进行建模。然而,pWCET估计通常是在受控或模拟环境下进行的。在本文中,考虑到操作系统和并发活动可能造成的干扰,我们将MBPTA应用于一个真正的多核平台,即树莓派3B。所发现的结果表明,尽管EVT是一种鲁棒技术,但它并不总是产生足够的模型和连贯的pWCET估计。由于MBPTA主要是在经典方法不适用的情况下使用的,正如所研究的平台的情况一样,因此本文报告的结果突出了在应用MBPTA进行pWCET估计时可能存在的风险。
{"title":"Possible risks with EVT-based timing analysis: an experimental study on a multi-core platform","authors":"J. Vasconcelos, George Lima","doi":"10.1109/SBESC56799.2022.9964853","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964853","url":null,"abstract":"Hardware architectures equipped with multiple cores, cache memory and branch prediction usually preclude the application of classical methods for determining execution time bounds for real-time tasks. As such bounds are fundamental in the designing of real-time system, Measurement-Based Probabilistic Timing Analysis (MBPTA) has been employed. A common choice is towards the derivation of probabilistic Worst-Case Execution Time (pWCET) via the use of Extreme Value Theory (EVT), a branch of statistics for modeling the maximum of a random variable. However, pWCET estimations are usually reported taking a controlled or simulated environment. In this paper we rather apply MBPTA in a real multi-core platform, namely Raspberry Pi 3B, taking into consideration possible interference due to operating system and concurrent activities. The found results indicate that although EVT is a robust technique, it does not always produce adequate models and coherent pWCET estimations. As MBPTA is primarily called for when classical methods are not applicable, as it is the case for the studied platform, the results reported in this paper highlight possible risks in when applying MBPTA for pWCET estimations.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114962202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven Anomaly Detection of Engine Knock based on Automotive ECU 基于ECU的发动机爆震数据驱动异常检测
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9965059
Leonardo Francis, Victor Elízio Pierozan, G. Gracioli, G. Araújo
In the automotive industry, the study of internal combustion engines (ICE) has massively been studied to identify the occurrence of some failures, such as engine knock [1], [2]. The occurrence of this phenomenon on the engine directly affects the engine maintenance cost and longer engine life. The use of machine learning for failure detection is highlighted [3]–[6]. An investigation was carried out by performing experiments with a Renault Sandero car, collecting some sets of variables for batch analysis. In this paper, we use artificial intelligence techniques with a data-driven approach, more specifically, machine learning, to detect the phenomenon of engine knock. The investigation was conducted with a feature extraction classifier, AutoEnconder Dense and Convolutional, SVM, and Isolated Forest. Finally, the best result achieved was 81% considering a feature extraction classifier on the collection of variables defined.
在汽车工业中,对内燃机(ICE)进行了大量的研究,以确定一些故障的发生,如发动机爆震[1],[2]。这种现象在发动机上的发生直接影响到发动机的维修成本和更长的发动机寿命。机器学习在故障检测中的应用[3]-[6]突出显示。通过对雷诺桑德罗汽车进行实验,收集了一些变量集进行批量分析,进行了调查。在本文中,我们使用数据驱动方法的人工智能技术,更具体地说,机器学习,来检测发动机爆震现象。研究采用了特征提取分类器、autoencoder Dense and Convolutional、SVM和Isolated Forest。最后,考虑到在定义的变量集合上使用特征提取分类器,获得的最佳结果为81%。
{"title":"Data-driven Anomaly Detection of Engine Knock based on Automotive ECU","authors":"Leonardo Francis, Victor Elízio Pierozan, G. Gracioli, G. Araújo","doi":"10.1109/SBESC56799.2022.9965059","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9965059","url":null,"abstract":"In the automotive industry, the study of internal combustion engines (ICE) has massively been studied to identify the occurrence of some failures, such as engine knock [1], [2]. The occurrence of this phenomenon on the engine directly affects the engine maintenance cost and longer engine life. The use of machine learning for failure detection is highlighted [3]–[6]. An investigation was carried out by performing experiments with a Renault Sandero car, collecting some sets of variables for batch analysis. In this paper, we use artificial intelligence techniques with a data-driven approach, more specifically, machine learning, to detect the phenomenon of engine knock. The investigation was conducted with a feature extraction classifier, AutoEnconder Dense and Convolutional, SVM, and Isolated Forest. Finally, the best result achieved was 81% considering a feature extraction classifier on the collection of variables defined.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Label-affinity-Scheduler: Considering Business Requirements in Container Scheduling for Multi-Cloud and Multi-Tenant Environments 标签关联调度器:考虑多云和多租户环境中容器调度的业务需求
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964784
Luiz Fernando Altran, Guilherme Galante, M. Oyamada
The goal of this paper is to present a scheduling strategy that addresses a set of customer-specific business requirements when deploying containers, targeting multi-user and multi-cloud environments. This is done by extending the label scheme used to specify attributes for compute nodes and requirements for applications, and by associating workloads to the nodes with the highest affinity. The proposal is validated by implementing a custom scheduler for Kubernetes orchestrator. The custom scheduler was validated in an environment consisting of 25 nodes distributed across 4 providers with different hardware configurations and geographical locations. The results confirm the effectiveness of our scheduler in different scenarios, granting the business requirements assigned to each application.
本文的目标是提供一种调度策略,在部署容器时解决一组客户特定的业务需求,目标是多用户和多云环境。这是通过扩展用于指定计算节点属性和应用程序需求的标签方案,以及通过将工作负载关联到具有最高亲和力的节点来实现的。通过为Kubernetes编排器实现一个自定义调度程序来验证该建议。自定义调度器在由25个节点组成的环境中进行了验证,这些节点分布在4个具有不同硬件配置和地理位置的提供者中。结果证实了我们的调度器在不同场景中的有效性,授予分配给每个应用程序的业务需求。
{"title":"Label-affinity-Scheduler: Considering Business Requirements in Container Scheduling for Multi-Cloud and Multi-Tenant Environments","authors":"Luiz Fernando Altran, Guilherme Galante, M. Oyamada","doi":"10.1109/SBESC56799.2022.9964784","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964784","url":null,"abstract":"The goal of this paper is to present a scheduling strategy that addresses a set of customer-specific business requirements when deploying containers, targeting multi-user and multi-cloud environments. This is done by extending the label scheme used to specify attributes for compute nodes and requirements for applications, and by associating workloads to the nodes with the highest affinity. The proposal is validated by implementing a custom scheduler for Kubernetes orchestrator. The custom scheduler was validated in an environment consisting of 25 nodes distributed across 4 providers with different hardware configurations and geographical locations. The results confirm the effectiveness of our scheduler in different scenarios, granting the business requirements assigned to each application.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LLVM-ACT: Profiling Based Tool for Approximate Computing Technique Selection 基于轮廓分析的近似计算技术选择工具
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9965085
Lavinia Miranda, M. Pereira, Jorgiano Vidal
Approximate Computing is currently an emerging paradigm that seeks to replace some data accuracy with aspects such as performance and energy efficiency. There are tools within this scope that apply some approximate computation techniques at software computational level. However, these tools are limited in a way that they only cover some specific scope, apply only one of the known techniques and/or need manual code annotations to work out. Thus, this work proposes the implementation of a tool that, according to the application profiling, chooses the most appropriate approximate computing technique to be applied. LLVM-ACT uses the LLVM compilation infrastructure, where each step is implemented as a code analysis or transformation LLVM Pass. The results show that the technique chosen by LLVM-ACT is cost-effective if low error rates and high speedup are taken into account, with an 8x speedup with 22% error rate on average with the Fluidanimate application.
近似计算是目前一种新兴的范式,它试图用性能和能源效率等方面取代某些数据准确性。在这个范围内,有一些工具在软件计算级别上应用了一些近似计算技术。然而,这些工具在某种程度上是有限的,它们只覆盖一些特定的范围,只应用一种已知的技术和/或需要手动代码注释才能工作。因此,这项工作提出了一个工具的实现,根据应用程序分析,选择最合适的近似计算技术来应用。LLVM- act使用LLVM编译基础结构,其中每个步骤都作为代码分析或转换LLVM Pass实现。结果表明,在考虑低错误率和高加速的情况下,LLVM-ACT所选择的技术是经济有效的,在Fluidanimate应用中平均加速8倍,错误率22%。
{"title":"LLVM-ACT: Profiling Based Tool for Approximate Computing Technique Selection","authors":"Lavinia Miranda, M. Pereira, Jorgiano Vidal","doi":"10.1109/SBESC56799.2022.9965085","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9965085","url":null,"abstract":"Approximate Computing is currently an emerging paradigm that seeks to replace some data accuracy with aspects such as performance and energy efficiency. There are tools within this scope that apply some approximate computation techniques at software computational level. However, these tools are limited in a way that they only cover some specific scope, apply only one of the known techniques and/or need manual code annotations to work out. Thus, this work proposes the implementation of a tool that, according to the application profiling, chooses the most appropriate approximate computing technique to be applied. LLVM-ACT uses the LLVM compilation infrastructure, where each step is implemented as a code analysis or transformation LLVM Pass. The results show that the technique chosen by LLVM-ACT is cost-effective if low error rates and high speedup are taken into account, with an 8x speedup with 22% error rate on average with the Fluidanimate application.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126550207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAPIVe: Simple AVX to PIM Vectorizer SAPIVe:简单的AVX到PIM矢量器
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964539
Rodrigo M. Sokulski, P. C. Santos, Sairo R. dos Santos, M. Alves
Larger vector extensions are one of the commonly used techniques to meet the growing demands from computational systems. These extensions, capable of operating over multiple data elements with a single instruction, exert a lot of pressure on the memory hierarchy, increasing the impact of growing problems such as Memory-Wall and von Neumann bottleneck. An alternative to work around these problems would be adding processing elements close to the memory, known as Processing-In-Memory (PIM). As with processor vector extensions, the most efficient PIM techniques use in-memory vector processing units. There are several ways to convert a code into in-memory vector processing, such as binary hardware translation, which may not depend on programmers or adapted software and can be carried out transparently to its users. However, in the context of in-memory processing, this conversion technique presents some challenges related to the PIM instructions format and the structure of the loops present in each application. Thus, this article proposes and evaluates Simple AVX to PIM Vectorizer (SAPIVe), a hardware binary translation mechanism from processor vector instructions into in-memory vector instructions, which, in addition to processing more data, also performs loads, operations, and stores at once. Our results show that our mechanism can accelerate kernels up to 5 times with possible performance losses prevented using loop predictors.
更大的向量扩展是满足计算系统日益增长的需求的常用技术之一。这些扩展能够用一条指令操作多个数据元素,对内存层次结构施加了很大的压力,增加了诸如内存墙和冯·诺伊曼瓶颈等日益严重的问题的影响。解决这些问题的另一种方法是在内存附近添加处理元素,称为内存中处理(PIM)。与处理器向量扩展一样,最有效的PIM技术使用内存中的向量处理单元。有几种方法可以将代码转换为内存中的矢量处理,例如二进制硬件转换,它可能不依赖于程序员或改编的软件,并且可以对其用户透明地执行。然而,在内存处理的上下文中,这种转换技术提出了一些与PIM指令格式和每个应用程序中存在的循环结构相关的挑战。因此,本文提出并评估了Simple AVX to PIM Vectorizer (SAPIVe),这是一种从处理器矢量指令到内存中的矢量指令的硬件二进制转换机制,它除了处理更多数据外,还可以一次执行加载、操作和存储。我们的结果表明,我们的机制可以将内核加速多达5倍,并且使用循环预测器可以防止可能的性能损失。
{"title":"SAPIVe: Simple AVX to PIM Vectorizer","authors":"Rodrigo M. Sokulski, P. C. Santos, Sairo R. dos Santos, M. Alves","doi":"10.1109/SBESC56799.2022.9964539","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964539","url":null,"abstract":"Larger vector extensions are one of the commonly used techniques to meet the growing demands from computational systems. These extensions, capable of operating over multiple data elements with a single instruction, exert a lot of pressure on the memory hierarchy, increasing the impact of growing problems such as Memory-Wall and von Neumann bottleneck. An alternative to work around these problems would be adding processing elements close to the memory, known as Processing-In-Memory (PIM). As with processor vector extensions, the most efficient PIM techniques use in-memory vector processing units. There are several ways to convert a code into in-memory vector processing, such as binary hardware translation, which may not depend on programmers or adapted software and can be carried out transparently to its users. However, in the context of in-memory processing, this conversion technique presents some challenges related to the PIM instructions format and the structure of the loops present in each application. Thus, this article proposes and evaluates Simple AVX to PIM Vectorizer (SAPIVe), a hardware binary translation mechanism from processor vector instructions into in-memory vector instructions, which, in addition to processing more data, also performs loads, operations, and stores at once. Our results show that our mechanism can accelerate kernels up to 5 times with possible performance losses prevented using loop predictors.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tolerating Resource Exhaustion Attacks in the Time-Triggered Architecture 在时间触发架构中容忍资源耗尽攻击
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964703
Mohammad Ibrahim Alkoudsi, G. Fohler, M. Völp
The Time-Triggered Architecture (TTA) presents a blueprint for building safe and real-time constrained distributed systems, based on a set of orthogonal concepts that make extensive use of the availability of a globally consistent notion of time and a priori knowledge of events. Although the TTA tolerates arbitrary failures of any of its nodes by architectural means (active node replication, a membership service, and bus guardians), the design of these means considers only accidental faults. However, distributed safety- and real-time critical systems have been emerging into more open and interconnected systems, operating autonomously for prolonged times and interfacing with other possibly non-real-time systems. Therefore, the existence of vulnerabilities that adversaries may exploit to compromise system safety cannot be ruled out. In this paper, we discuss potential targeted attacks capable of bypassing TTA's fault-tolerance mechanisms and demonstrate how two well-known recovery techniques - proactive and reactive rejuvenation - can be incorporated into TTA to reduce the window of vulnerability for attacks without introducing extensive and costly changes.
时间触发架构(TTA)提出了构建安全和实时约束分布式系统的蓝图,该蓝图基于一组正交概念,这些概念广泛利用了全局一致的时间概念和事件先验知识的可用性。尽管TTA可以通过体系结构手段(活动节点复制、成员服务和总线监护人)容忍其任何节点的任意故障,但这些手段的设计只考虑意外故障。然而,分布式安全和实时关键系统已经成为更加开放和互联的系统,可以长时间自主运行,并与其他可能的非实时系统接口。因此,不能排除存在被对手利用来破坏系统安全的漏洞。在本文中,我们讨论了能够绕过TTA容错机制的潜在目标攻击,并演示了如何将两种众所周知的恢复技术——主动恢复和被动恢复——整合到TTA中,以减少攻击的漏洞窗口,而无需引入广泛和昂贵的更改。
{"title":"Tolerating Resource Exhaustion Attacks in the Time-Triggered Architecture","authors":"Mohammad Ibrahim Alkoudsi, G. Fohler, M. Völp","doi":"10.1109/SBESC56799.2022.9964703","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964703","url":null,"abstract":"The Time-Triggered Architecture (TTA) presents a blueprint for building safe and real-time constrained distributed systems, based on a set of orthogonal concepts that make extensive use of the availability of a globally consistent notion of time and a priori knowledge of events. Although the TTA tolerates arbitrary failures of any of its nodes by architectural means (active node replication, a membership service, and bus guardians), the design of these means considers only accidental faults. However, distributed safety- and real-time critical systems have been emerging into more open and interconnected systems, operating autonomously for prolonged times and interfacing with other possibly non-real-time systems. Therefore, the existence of vulnerabilities that adversaries may exploit to compromise system safety cannot be ruled out. In this paper, we discuss potential targeted attacks capable of bypassing TTA's fault-tolerance mechanisms and demonstrate how two well-known recovery techniques - proactive and reactive rejuvenation - can be incorporated into TTA to reduce the window of vulnerability for attacks without introducing extensive and costly changes.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted Monitor: TEE-Based System Monitoring 可信监视器:基于tee的系统监视
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964869
Benedikt Jung, Christian Eichler, Jonas Röckl, R. Schlenk, Timo Hönig, Tilo Müller
As trusted computing becomes increasingly important, Trusted Execution Environments (TEEs) see more widespread use. A particular high demand for security arises in the context of embedded systems in critical infrastructures. We present a novel intrusion detection system called the Trusted Monitor (TM) that protects its integrity even in the presence of a system-level attacker by running inside the ARM TrustZone TEE. The TM constantly monitors the system using hardware performance counters and detects intrusions based on the classification by an application-specific machine learning model. Our evaluation shows that the TM correctly classifies 86% of 183 evaluated workloads, while the performance overhead stays below 2%. In particular, we show that a real-world kernel-level rootkit observably influences the hardware performance counters and, thus, can be detected.
随着可信计算变得越来越重要,可信执行环境(tee)得到了更广泛的应用。在关键基础设施中的嵌入式系统环境中,对安全性的要求特别高。我们提出了一种称为可信监视器(TM)的新型入侵检测系统,即使在系统级攻击者存在的情况下,它也可以通过在ARM TrustZone TEE内运行来保护其完整性。TM使用硬件性能计数器持续监控系统,并通过特定于应用程序的机器学习模型基于分类检测入侵。我们的评估表明,TM对183个评估工作负载中的86%进行了正确分类,而性能开销保持在2%以下。特别是,我们展示了一个真实的内核级rootkit可以明显地影响硬件性能计数器,因此可以被检测到。
{"title":"Trusted Monitor: TEE-Based System Monitoring","authors":"Benedikt Jung, Christian Eichler, Jonas Röckl, R. Schlenk, Timo Hönig, Tilo Müller","doi":"10.1109/SBESC56799.2022.9964869","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964869","url":null,"abstract":"As trusted computing becomes increasingly important, Trusted Execution Environments (TEEs) see more widespread use. A particular high demand for security arises in the context of embedded systems in critical infrastructures. We present a novel intrusion detection system called the Trusted Monitor (TM) that protects its integrity even in the presence of a system-level attacker by running inside the ARM TrustZone TEE. The TM constantly monitors the system using hardware performance counters and detects intrusions based on the classification by an application-specific machine learning model. Our evaluation shows that the TM correctly classifies 86% of 183 evaluated workloads, while the performance overhead stays below 2%. In particular, we show that a real-world kernel-level rootkit observably influences the hardware performance counters and, thus, can be detected.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bears: Building Energy-Aware Reconfigurable Systems 熊:建筑节能可重构系统
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964629
Benedict Herzog, S. Reif, Fabian Hügel, Wolfgang Schröder-Preikschat, Timo Hönig
Energy efficiency has developed to one of the most important non-functional system properties. One keystone to building an energy-efficient system is the right system configuration, which is tailored to the currently running application and hardware. Finding such a right system configuration manually, however, is a complex and often unfeasible task due to the vast configuration space on the one side and the required hardware and application knowledge on the other side. This paper presents and refines an approach to automatically identify and select energy-efficient configurations in re-configurable systems. The approach relies on different machine-learning techniques and achieves energy efficiency improvements of up to 10.8 % out of 13.3 % by automatically adapting the system configuration on a Linux system. Additionally, we analyse the application knowledge required for selecting the configuration and make a proposal how to generate sufficient training data.
能源效率已经发展成为最重要的非功能系统特性之一。构建节能系统的一个关键是正确的系统配置,它是针对当前运行的应用程序和硬件量身定制的。然而,手动查找这样一个正确的系统配置是一项复杂且通常不可行的任务,因为一方面有巨大的配置空间,另一方面又需要硬件和应用程序知识。本文提出并改进了一种在可重构系统中自动识别和选择节能配置的方法。该方法依赖于不同的机器学习技术,通过自动调整Linux系统上的系统配置,实现了高达13.3%的能源效率提高10.8%。此外,我们分析了选择配置所需的应用知识,并提出了如何生成足够的训练数据的建议。
{"title":"Bears: Building Energy-Aware Reconfigurable Systems","authors":"Benedict Herzog, S. Reif, Fabian Hügel, Wolfgang Schröder-Preikschat, Timo Hönig","doi":"10.1109/SBESC56799.2022.9964629","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964629","url":null,"abstract":"Energy efficiency has developed to one of the most important non-functional system properties. One keystone to building an energy-efficient system is the right system configuration, which is tailored to the currently running application and hardware. Finding such a right system configuration manually, however, is a complex and often unfeasible task due to the vast configuration space on the one side and the required hardware and application knowledge on the other side. This paper presents and refines an approach to automatically identify and select energy-efficient configurations in re-configurable systems. The approach relies on different machine-learning techniques and achieves energy efficiency improvements of up to 10.8 % out of 13.3 % by automatically adapting the system configuration on a Linux system. Additionally, we analyse the application knowledge required for selecting the configuration and make a proposal how to generate sufficient training data.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning-Based Approach to Calibrate Low-Cost Particulate Matter Sensors 一种基于机器学习的方法校准低成本颗粒物传感器
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964983
André F. Pastório, F. Spanhol, L. Martins, E. T. Camargo
Low-cost particulate matter (LC-PM) sensors have been studied around the world as a viable alternative to expensive reference stations for monitoring air quality. However, LC-PM sensors require periodic calibration, since their data are often inaccurate and subject to uncertainty. Sensors calibration can be performed through machine learning methods where the sensor is placed in a real environment subject to the local environmental conditions of the place and its measurement compared to a reference equipment. This work evaluates different machine learning methods in five different models of LC-PM sensors, aiming to select the most appropriate sensor and a calibration method to be used in a low-cost air quality station in the context of smart cities.
世界各地都在研究低成本颗粒物(LC-PM)传感器,作为监测空气质量的昂贵参考站的可行替代方案。然而,LC-PM传感器需要定期校准,因为它们的数据通常是不准确的,并且受到不确定性的影响。传感器校准可以通过机器学习方法进行,其中传感器放置在真实环境中,受当地环境条件的影响,并与参考设备进行测量。本工作评估了五种不同LC-PM传感器模型中的不同机器学习方法,旨在选择最合适的传感器和校准方法,用于智能城市背景下的低成本空气质量站。
{"title":"A Machine Learning-Based Approach to Calibrate Low-Cost Particulate Matter Sensors","authors":"André F. Pastório, F. Spanhol, L. Martins, E. T. Camargo","doi":"10.1109/SBESC56799.2022.9964983","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964983","url":null,"abstract":"Low-cost particulate matter (LC-PM) sensors have been studied around the world as a viable alternative to expensive reference stations for monitoring air quality. However, LC-PM sensors require periodic calibration, since their data are often inaccurate and subject to uncertainty. Sensors calibration can be performed through machine learning methods where the sensor is placed in a real environment subject to the local environmental conditions of the place and its measurement compared to a reference equipment. This work evaluates different machine learning methods in five different models of LC-PM sensors, aiming to select the most appropriate sensor and a calibration method to be used in a low-cost air quality station in the context of smart cities.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying Runtime Verification in Real-Time Systems with FreeRTOS 运行时验证在FreeRTOS实时系统中的应用
Pub Date : 2022-11-21 DOI: 10.1109/SBESC56799.2022.9964952
E. Broering, L. Becker
Runtime Verification (RV) is a lightweight and dynamic technique that checks the current execution of the system through structures called monitors and produces a verdict on whether or not this execution satisfies a certain property of the system correction. Pedro et.al. developed a framework for performing RV of bare-metal real-time embedded systems (RTS). It consists of a tool for automatic synthesizing C++11 targeted monitors and a runtime library to support docking monitors on bare metal boards. The framework is capable of handling explicit time and durations, two of the essential concepts for anomaly detection of hard real-time systems. A limitation of this tool is that it only follows the POSIX standard. However, many real-time bare-metal embedded system applications do not support this architecture, such as those using FreeRTOS. This work aims to complement such work. Its goal is to update the RV process, making an adaptation for using it in non-POSIX RTOS, such as the FreeRTOS. The paper details the proposed system, also presenting a study to analize the scheduling feasibility of a real-time task set.
运行时验证(RV)是一种轻量级的动态技术,它通过称为监视器的结构检查系统的当前执行,并对该执行是否满足系统修正的某些属性产生判断。佩德罗出版社。开发了裸机实时嵌入式系统(RTS)的RV执行框架。它包括一个用于自动合成c++ 11目标监视器的工具和一个运行时库,以支持在裸机板上对接监视器。该框架能够处理显式时间和持续时间,这是硬实时系统异常检测的两个基本概念。这个工具的一个限制是它只遵循POSIX标准。然而,许多实时裸机嵌入式系统应用程序不支持这种架构,比如那些使用FreeRTOS的应用程序。这项工作旨在补充这种工作。它的目标是更新RV进程,使其适应于在非posix RTOS(如FreeRTOS)中使用。本文详细介绍了该系统,并对实时任务集调度的可行性进行了分析研究。
{"title":"Applying Runtime Verification in Real-Time Systems with FreeRTOS","authors":"E. Broering, L. Becker","doi":"10.1109/SBESC56799.2022.9964952","DOIUrl":"https://doi.org/10.1109/SBESC56799.2022.9964952","url":null,"abstract":"Runtime Verification (RV) is a lightweight and dynamic technique that checks the current execution of the system through structures called monitors and produces a verdict on whether or not this execution satisfies a certain property of the system correction. Pedro et.al. developed a framework for performing RV of bare-metal real-time embedded systems (RTS). It consists of a tool for automatic synthesizing C++11 targeted monitors and a runtime library to support docking monitors on bare metal boards. The framework is capable of handling explicit time and durations, two of the essential concepts for anomaly detection of hard real-time systems. A limitation of this tool is that it only follows the POSIX standard. However, many real-time bare-metal embedded system applications do not support this architecture, such as those using FreeRTOS. This work aims to complement such work. Its goal is to update the RV process, making an adaptation for using it in non-POSIX RTOS, such as the FreeRTOS. The paper details the proposed system, also presenting a study to analize the scheduling feasibility of a real-time task set.","PeriodicalId":130479,"journal":{"name":"2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130716459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 XII Brazilian Symposium on Computing Systems Engineering (SBESC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1