Languages and Software Engineering

Slides:



Advertisements
Similar presentations
CIS 376 Bruce R. Maxim UM-Dearborn
Advertisements

Network Innovation using OpenFlow: A Survey
8.
SWE Introduction to Software Engineering
Software Evolution Managing the processes of software system change
Chapter 13 Physical Architecture Layer Design
Internet Technologies Networking / Internet Protocols (TCP/IP) Server/Client Software Communication via Ports Web Page Technology Recipe of Web Page Development.
Issues on Software Testing for Safety-Critical Real-Time Automation Systems Shahdat Hossain Troy Mockenhaupt.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 27Slide 1 Chapter 27 Software Change.
Exploring the Tradeoffs of Configurability and Heterogeneity in Multicore Embedded Systems + Also Affiliated with NSF Center for High- Performance Reconfigurable.
Virtualization Technology Prof D M Dhamdhere CSE Department IIT Bombay Moving towards Virtualization… Department of Computer Science and Engineering, IIT.
ISO Tor Stålhane IDI / NTNU. What is ISO ISO 9001 was developed for the production industry but has a rather general structure ISO describes.
Software change  Managing the processes of software system change.
University of California, San Diego Computer Science and Engineering Concurrent Systems Architecture Group Agile Objects: Component-based Inherent Survivability.
Computing on the Cloud Jason Detchevery March 4 th 2009.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 27Slide 1 Software change l Managing the processes of software system change.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Basic Concepts Of CITRIX XENAPP.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 27Slide 1 Software change l Managing the processes of software system change.
 Chapter 13 – Dependability Engineering 1 Chapter 12 Dependability and Security Specification 1.
Refined ECSS Software Process Model Elements SD-TN-AI-0570, Issue 5 APPENDIX D.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
An OBSM method for Real Time Embedded Systems Veronica Eyo Sharvari Joshi.
Information Security Dashboard Senior Design Spring 2008 Brian Rappach.
1 Data Mining at work Krithi Ramamritham. 2 Dynamics of Web Data Dynamically created Web Pages -- using scripting languages Ad Component Headline Component.
What’s Ahead for Embedded Software? (Wed) Gilsoo Kim
Isograph Reliability Software Isolib Project Management.
LO2 Understand the key components used in networking.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Decisive Themes, July, JL-1 ARTEMIS Decisive Theme for Integrasys Pedro A. Ruiz Integrasys July, 2011.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Name/Title of Your App Prepared by: …… For the 5 th National ICT Innovation Competition.
Industrial Automation Part I Real Time Control Embedded Systems.
Computer System Structures
CompSci 280 S Introduction to Software Development
Introduction to Operating Systems
CS 325: Software Engineering
Evolutionary requirements
Chapter 5 – Requirements Engineering
IS301 – Software Engineering Dept of Computer Information Systems
UCLA ESB Platform ais. ucla
Arab Open University 2nd Semester, M301 Unit 5
SYSTEM ANALYSIS AND DESIGN
Software Engineering Architectural Design Chapter 6 Dr.Doaa Sami
Software Processes (a)
FTP - File Transfer Protocol
Frequently asked questions about software engineering
Real Time Operating System
Chapter 3: Windows7 Part 1.
Broad Emerging Themes in CPS/IoT
The Extensible Tool-chain for Evaluation of Architectural Models
Data, Databases, and DBMSs
CS 425/625 Software Engineering Architectural Design
Quad Charts David L. Mills University of Delaware
Fault Tolerance Distributed Web-based Systems
Survivable Real-Time Network Services (G409/J175)
Consistency and Replication
CS 501: Software Engineering Fall 1999
Introduction To software engineering
Analysis models and design models
IEEE MEDIA INDEPENDENT HANDOVER
Chapter 27 Software Change.
Model Base Validation Techniques for Software
CEN 5035, Software Engineering
Co-designed Virtual Machines for Reliable Computer Systems
Software Cost Estimation
Chapter 5 Architectural Design.
LabVIEW Based Embedded Design
WDF Custom Driver Design Pattern
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

Languages and Software Engineering Embedded constraints affect security Quantify capabilities, limit scope, target 8-bit & larger Issues: critical, non-recoverable, special netw., no sys admin Design for security (not retrofit)  formalize Need for metrics & models (some differ for embedded) e.g. higher reliability probability for safety crit. affects security Need for diversity (e.g., via dynamic adaptation) Self-modifying apps (e.g., via dyn. Transformation of pgm) Self-protecting/self-checking apps? Dynamic updates (in 24/7 operation) Need to limit overhead, retain predictabity, low cost Incorporate real-time requirements may undermine existing network protocols, add overhead… Interface b/w RT and non-RT components problematic Embedded clients + server need protection of both Need hardware assistance