The necessity of intrusion detection system (IDS) is concrete for automobiles, and is particularly critical for unmanned, autonomous ones. However, limited work has been done to detect intrusions in an autonomous car while existing IDSs have limitations against strong adversaries. We hence consider the very nature of autonomous car and propose to utilize the road context to build a Road context-aware IDS (RAIDS). We hypothesize that given a computer-controlled car, the pattern and data of frames transmitted on the in-vehicle communication network should be relatively regular and obtainable when the car is cruising through continuous road contexts. Accordingly we design RAIDS and implement a preliminary prototype that discerns and identifies anomalous frames fabricated or suspended by adversaries. Evaluation results show that RAIDS effectively detects intrusions that are beyond the capabilities of state-of-the-art IDS.
{"title":"Work-in-Progress: Road Context-Aware Intrusion Detection System for Autonomous Cars","authors":"Tanya Srivastava, Pryanshu Arora, Chundong Wang, Sudipta Chattopadhyay","doi":"10.1109/EMSOFT.2018.8537210","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537210","url":null,"abstract":"The necessity of intrusion detection system (IDS) is concrete for automobiles, and is particularly critical for unmanned, autonomous ones. However, limited work has been done to detect intrusions in an autonomous car while existing IDSs have limitations against strong adversaries. We hence consider the very nature of autonomous car and propose to utilize the road context to build a Road context-aware IDS (RAIDS). We hypothesize that given a computer-controlled car, the pattern and data of frames transmitted on the in-vehicle communication network should be relatively regular and obtainable when the car is cruising through continuous road contexts. Accordingly we design RAIDS and implement a preliminary prototype that discerns and identifies anomalous frames fabricated or suspended by adversaries. Evaluation results show that RAIDS effectively detects intrusions that are beyond the capabilities of state-of-the-art IDS.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125805799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537214
Youngho Choi, Jaeook Kwon, Seokjae Jeong, Hansub Park, Y. Eom
In this paper, we propose a dynamic analysis technique that diagnoses various kinds of deadlocks of embedded devices by OS-level analysis. Especially, we focus on minimizing performance overhead while inspecting deadlocks, because embedded applications run with limited system resources. Our experimental results show that our scheme detects all deadlocks which are induced in our test cases and incurs reasonable performance overhead (up to 16%), compared with the conventional scheme.
{"title":"Work-in-Progress: Lightweight Deadlock Detection Technique for Embedded Systems via OS-Level Analysis","authors":"Youngho Choi, Jaeook Kwon, Seokjae Jeong, Hansub Park, Y. Eom","doi":"10.1109/EMSOFT.2018.8537214","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537214","url":null,"abstract":"In this paper, we propose a dynamic analysis technique that diagnoses various kinds of deadlocks of embedded devices by OS-level analysis. Especially, we focus on minimizing performance overhead while inspecting deadlocks, because embedded applications run with limited system resources. Our experimental results show that our scheme detects all deadlocks which are induced in our test cases and incurs reasonable performance overhead (up to 16%), compared with the conventional scheme.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129442108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537220
Nicola Capodieci, R. Cavicchioli, M. Bertogna
Modern automotive grade embedded platforms feature high performance Graphics Processing Units (GPUs) to support the massively parallel processing power needed for next-generation autonomous driving applications. Hence, a GPU scheduling approach with strong Real-Time guarantees is needed. While previous research efforts focused on reverse engineering the GPU ecosystem in order to understand and control GPU scheduling on NVIDIA platforms, we provide an in depth explanation of the NVIDIA standard approach to GPU application scheduling on a Drive PX platform. Then, we discuss how a privileged scheduling server can be used to enforce arbitrary scheduling policies in a virtualized environment.
{"title":"Work-in-Progress: NVIDIA GPU Scheduling Details in Virtualized Environments","authors":"Nicola Capodieci, R. Cavicchioli, M. Bertogna","doi":"10.1109/EMSOFT.2018.8537220","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537220","url":null,"abstract":"Modern automotive grade embedded platforms feature high performance Graphics Processing Units (GPUs) to support the massively parallel processing power needed for next-generation autonomous driving applications. Hence, a GPU scheduling approach with strong Real-Time guarantees is needed. While previous research efforts focused on reverse engineering the GPU ecosystem in order to understand and control GPU scheduling on NVIDIA platforms, we provide an in depth explanation of the NVIDIA standard approach to GPU application scheduling on a Drive PX platform. Then, we discuss how a privileged scheduling server can be used to enforce arbitrary scheduling policies in a virtualized environment.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537189
Uraz Odyurt, Hugo Meyer, Simon Polstra, E. Paradas, Ignacio Gonzalez Alonso, A. Pimentel
We show experimental evidence and argue that communication-centric modelling of complex embedded computing systems provides predictive power over the workload dependent behaviour of these systems. System and external observables included in this behaviour can be utilised in the system's analysis. We provide the preliminary results from our detection (monitoring) and imitation (simulation) phases, both part of a larger workflow in development.
{"title":"Work-in-Progress: Communication-Centric Analysis of Complex Embedded Computing Systems","authors":"Uraz Odyurt, Hugo Meyer, Simon Polstra, E. Paradas, Ignacio Gonzalez Alonso, A. Pimentel","doi":"10.1109/EMSOFT.2018.8537189","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537189","url":null,"abstract":"We show experimental evidence and argue that communication-centric modelling of complex embedded computing systems provides predictive power over the workload dependent behaviour of these systems. System and external observables included in this behaviour can be utilised in the system's analysis. We provide the preliminary results from our detection (monitoring) and imitation (simulation) phases, both part of a larger workflow in development.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127645688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537186
P. Dovgalyuk, N. Fursova, I. Vasiliev, V. Makarov
This paper presents a novel approach for virtual machine introspection of the embedded systems based on the unknown revisions of the known kernels. Existing introspection methods require embedding the code into the guest to capture the data for analysis algorithms. When OS image is extracted from the ROM, usually no analysis code can be loaded into the virtual machine. We propose new non-intrusive method for extracting the kernel- and process-level information from such virtual machines. This method is based on the application binary interface, which is small enough and usually non-volatile. Therefore one analysis configuration may be used for different systems with the kernels from the same family without re-tuning them. We also present the analysis framework based on the simulator QEMU. It includes instrumentation and some tools for extracting the process- and kernel-level information from the guest. Our framework may be applied to ROM-based guest systems and enables using of record/replay of the system execution during the analysis. We applied our framework to some public firmwares to evaluate how our method works on the embedded systems with custom Linux kernel.
{"title":"Work-in-Progress: Introspection of the Linux-Based Embedded Firmwares","authors":"P. Dovgalyuk, N. Fursova, I. Vasiliev, V. Makarov","doi":"10.1109/EMSOFT.2018.8537186","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537186","url":null,"abstract":"This paper presents a novel approach for virtual machine introspection of the embedded systems based on the unknown revisions of the known kernels. Existing introspection methods require embedding the code into the guest to capture the data for analysis algorithms. When OS image is extracted from the ROM, usually no analysis code can be loaded into the virtual machine. We propose new non-intrusive method for extracting the kernel- and process-level information from such virtual machines. This method is based on the application binary interface, which is small enough and usually non-volatile. Therefore one analysis configuration may be used for different systems with the kernels from the same family without re-tuning them. We also present the analysis framework based on the simulator QEMU. It includes instrumentation and some tools for extracting the process- and kernel-level information from the guest. Our framework may be applied to ROM-based guest systems and enables using of record/replay of the system execution during the analysis. We applied our framework to some public firmwares to evaluate how our method works on the embedded systems with custom Linux kernel.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127172390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537206
Sibin Mohan, Mikael Asplund, Gedare Bloom, A. Sadeghi, Ahmad Ibrahim, Negin Salajageh, P. Griffioen, Bruno Sinipoli
The Internet-of-Things (IoT) is a large and complex domain. These systems are often constructed using a very diverse set of hardware, software and protocols. This, combined with the ever increasing number of IoT solutions/services that are rushed to market means that most such systems are rife with security holes. Recent incidents (e.g., the Mirai botnet) further highlight such security issues. With emerging technologies such as blockchain and software-defined networks (SDNs), new security solutions are possible in the IoT domain. In this paper we will explore future trends in IoT security: (a) the use of blockchains in IoT security, (b) data provenance for sensor information, (c) reliable and secure transport mechanisms using SDNs (d) scalable authentication and remote attestation mechanisms for IoT devices and (e) threat modeling and risk/maturity assessment frameworks for the domain.
{"title":"Special Session: The Future of IoT Security","authors":"Sibin Mohan, Mikael Asplund, Gedare Bloom, A. Sadeghi, Ahmad Ibrahim, Negin Salajageh, P. Griffioen, Bruno Sinipoli","doi":"10.1109/EMSOFT.2018.8537206","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537206","url":null,"abstract":"The Internet-of-Things (IoT) is a large and complex domain. These systems are often constructed using a very diverse set of hardware, software and protocols. This, combined with the ever increasing number of IoT solutions/services that are rushed to market means that most such systems are rife with security holes. Recent incidents (e.g., the Mirai botnet) further highlight such security issues. With emerging technologies such as blockchain and software-defined networks (SDNs), new security solutions are possible in the IoT domain. In this paper we will explore future trends in IoT security: (a) the use of blockchains in IoT security, (b) data provenance for sensor information, (c) reliable and secure transport mechanisms using SDNs (d) scalable authentication and remote attestation mechanisms for IoT devices and (e) threat modeling and risk/maturity assessment frameworks for the domain.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"39 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537217
Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang
We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.
{"title":"Work-in-Progress: Design of Security-Critical Distributed Real-Time Applications with Fault-Tolerant Constraint","authors":"Wei Jiang, Haibo Hu, Jinyu Zhan, Ke Jiang","doi":"10.1109/EMSOFT.2018.8537217","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537217","url":null,"abstract":"We approach the design of security-critical distributed applications with task-level fault-tolerant techniques. We focus on the impact of fault tolerance on secure message communication, which was seriously overlooked before. Fault-tolerant techniques, e.g., task re-execution and active replica, are leveraged to tolerate faults in task executions, while cryptography is deployed to protect the confidentiality of messages delivered over the communication media. The design problem is to minimize the schedule length and security vulnerability of the application, subject to given fault-tolerant constraints. We then propose a multi-objective optimization method to find the best solutions. Initial experiments indicated the efficiency.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126078851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537218
Nilotpal Chakraborty, Arijit Mondal, S. Mondal
In this work, we propose a multi-objective optimal scheduling strategy for air-conditioning devices to optimize both energy consumption and thermal comfort for the users. We propose a graph-based modeling for the problem and utilize Johnson's all elementary circuit finding algorithm to obtain the desired solutions. The proposed methodology has been experimented on test cases that mimic real-world scenario, and further, the applicability of Karp's minimum mean cycle algorithm is also studied in this problem set-up.
{"title":"Work-in-Progress: Towards Optimal Scheduling of Thermal Comfortability and Smoothening of Load Profile in Energy Efficient Buildings","authors":"Nilotpal Chakraborty, Arijit Mondal, S. Mondal","doi":"10.1109/EMSOFT.2018.8537218","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537218","url":null,"abstract":"In this work, we propose a multi-objective optimal scheduling strategy for air-conditioning devices to optimize both energy consumption and thermal comfort for the users. We propose a graph-based modeling for the problem and utilize Johnson's all elementary circuit finding algorithm to obtain the desired solutions. The proposed methodology has been experimented on test cases that mimic real-world scenario, and further, the applicability of Karp's minimum mean cycle algorithm is also studied in this problem set-up.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115590613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537236
Houssam Abbas, I. Saha, Yasser Shoukry, Rüdiger Ehlers, Georgios Fainekos, Rajesh K. Gupta, R. Majumdar, Dogan Ulus
This paper surveys recent challenges and solutions in the design, implementation, and verification of embedded software for robotics. Emphasis is placed on mobile robots, like self-driving cars. In design, it addresses programming support for robotic systems, secure state estimation, and ROS-based monitor generation. In the implementation phase, it describes the synthesis of control software using finite precision arithmetic, real-time platforms and architectures for safety-critical robotics, efficient implementation of neural network based-controllers, and standards for computer vision applications. The issues in verification include verification of neural network-based robotic controllers, and falsification of closed-loop control systems. The paper also describes notable open-source robotic platforms. Along the way, we highlight important research problems for developing the next generation of high-performance, low-resource-usage, correct embedded software.
{"title":"Special Session: Embedded Software for Robotics: Challenges and Future Directions","authors":"Houssam Abbas, I. Saha, Yasser Shoukry, Rüdiger Ehlers, Georgios Fainekos, Rajesh K. Gupta, R. Majumdar, Dogan Ulus","doi":"10.1109/EMSOFT.2018.8537236","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537236","url":null,"abstract":"This paper surveys recent challenges and solutions in the design, implementation, and verification of embedded software for robotics. Emphasis is placed on mobile robots, like self-driving cars. In design, it addresses programming support for robotic systems, secure state estimation, and ROS-based monitor generation. In the implementation phase, it describes the synthesis of control software using finite precision arithmetic, real-time platforms and architectures for safety-critical robotics, efficient implementation of neural network based-controllers, and standards for computer vision applications. The issues in verification include verification of neural network-based robotic controllers, and falsification of closed-loop control systems. The paper also describes notable open-source robotic platforms. Along the way, we highlight important research problems for developing the next generation of high-performance, low-resource-usage, correct embedded software.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/EMSOFT.2018.8537199
Hideki Takase, Tomoya Mori, K. Takagi, N. Takagi
Although ROS (Robotic Operating System) has attracted attention to enhance the productivity of robot software development, it is necessary to adopt the device with high function and large power consumption enough to install Linux. This paper designs a lightweight runtime environment of ROS nodes onto mid-range embedded devices. Our environment, that is named to mROS, consists of a real-time OS and TCP/IP protocol stack to provide a tiny ROS communication library. mROS provides the connectivity to host and other ROS nodes with the native ROS network protocol. One of advantages for mROS is that native ROS nodes can be ported from Linux-based systems to RTOS-based systems since APIs with the same name of native ROS can be used in the embedded program. Experimental results validate that the performance requirement of mROS can be achieved for the construction of distributed robot systems.
{"title":"Work-in-Progress: Design Concept of a Lightweight Runtime Environment for Robot Software Components Onto Embedded Devices","authors":"Hideki Takase, Tomoya Mori, K. Takagi, N. Takagi","doi":"10.1109/EMSOFT.2018.8537199","DOIUrl":"https://doi.org/10.1109/EMSOFT.2018.8537199","url":null,"abstract":"Although ROS (Robotic Operating System) has attracted attention to enhance the productivity of robot software development, it is necessary to adopt the device with high function and large power consumption enough to install Linux. This paper designs a lightweight runtime environment of ROS nodes onto mid-range embedded devices. Our environment, that is named to mROS, consists of a real-time OS and TCP/IP protocol stack to provide a tiny ROS communication library. mROS provides the connectivity to host and other ROS nodes with the native ROS network protocol. One of advantages for mROS is that native ROS nodes can be ported from Linux-based systems to RTOS-based systems since APIs with the same name of native ROS can be used in the embedded program. Experimental results validate that the performance requirement of mROS can be achieved for the construction of distributed robot systems.","PeriodicalId":375994,"journal":{"name":"2018 International Conference on Embedded Software (EMSOFT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}