SystemC Test Case Generation with the Gazebo Simulator

Slides:



Advertisements
Similar presentations
Real-time, low-resource corridor reconstruction using a single consumer grade RGB camera is a powerful tool for allowing a fast, inexpensive solution to.
Advertisements

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
REAL-TIME SOFTWARE SYSTEMS DEVELOPMENT Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
ASP.NET Programming with C# and SQL Server First Edition Chapter 8 Manipulating SQL Server Databases with ASP.NET.
Remote Surveillance Vehicle Design Review By: Bill Burgdorf Tom Fisher Eleni Binopolus-Rumayor.
Students: Nadia Goshmir, Yulia Koretsky Supervisor: Shai Rozenrauch Industrial Project Advanced Tool for Automatic Testing Final Presentation.
CSCI 6962: Server-side Design and Programming JDBC Database Programming.
Learningcomputer.com SQL Server 2008 Configuration Manager.
I/O Computer Organization II 1 Interconnecting Components Need interconnections between – CPU, memory, I/O controllers Bus: shared communication channel.
Communicating Real-Time State Machines (CRSM) State machines that communicate synchronously Unique unidirectional channels are used for the communication.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
SPEAKER: MUHAMMAD REZA ZULMAN DATE: NOVEMBER 17, 2014 OPENFLOW SPECIFICATION.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
SPS Spotlight Series October 2014
ASP.NET Programming with C# and SQL Server First Edition
Web Applications Security Cryptography 1
Chapter 19: Network Management
PPP Protocol.
PPP Protocol.
Memory Hierarchy Ideal memory is fast, large, and inexpensive
Architectures of Digital Information Systems Part 1: Interrupts and DMA dr.ir. A.C. Verschueren Eindhoven University of Technology Section of Digital.
Monitoring systems COMET types MS55 & MS6
Computer System Overview
TrueTime.
I/O SYSTEMS MANAGEMENT Krishna Kumar Ahirwar ( )
2. OPERATING SYSTEM 2.1 Operating System Function
Input/Output and Communication
Receiving New Lending requests
Chapter 9 ICMP.
Chapter 2: System Structures
Introduction to System Analysis and Design
Introduction to Operating System (OS)
Thomas Ulz, Thomas Pieber, Christian Steger1
Chapter 3 Top Level View of Computer Function and Interconnection
E3165 DIGITAL ELECTRONIC SYSTEM
Chapter 12: Query Processing
IRQ, DMA and I/O Ports - Introduction -
SWITCHING Switched Network Circuit-Switched Network Datagram Networks
Input/Output Organization contd:
Siemens Step 7 Project with Controllere in 7 Steps: Step 1
Module IV Memory Organization.
Windows® MultiPoint™ Server 2010
Serial Communication Interface: Using 8251
N-Guard: a Solution to Secure Access to NFC tags
Setting Up Firewall using Netfilter and Iptables
Software Requirements Specification Document
BIC 10503: COMPUTER ARCHITECTURE
by Xiang Mao and Qin Chen
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
Lecture 25: Multiprocessors
OPEN FOR PARTNERS PARTNERS
Denial-of-Service Jammer Detector Training Course Worldsensing
An Improved Novel Key Management Protocol for RFID Systems
Teechain: Scalable Blockchain Payments using Trusted Execution Environments GIZEM AKDENIZ DECEMBER 13 , 2018.
제 7 장 Cosequential Processing and the Sorting of Large Files
Chapter 15: Network Monitoring and Tuning
Lecture 24: Multiprocessors
PPP Protocol.
Hongchao Zhou, Xiaohong Guan, Chengjie Wu
communications system
Computer Networks Protocols
Chapter 13: I/O Systems.
Security in Wide Area Networks
William Stallings Computer Organization and Architecture
Introduction Communication Modes Transmission Modes
Presentation transcript:

SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 1 SystemC Test Case Generation with the Gazebo Simulator Institute of Technical Informatics 26.07.17 Thomas Wolfgang Pieber 1

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 2 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 2

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 3 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 3

Introduction New System Designs need to be tested thoroughly SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 4 Introduction New System Designs need to be tested thoroughly Currently done by manually specifying I/O combinations and random testing Designing tests based on use cases and boundary conditions Oportunity that the designer misses special cases Institute of Technical Informatics 26.07.17 4

24.11.15 24.11.15 Introduction 5 Improvement Use cases can be used to directly generate valid test scenarios Boundary conditions are simulated through changing initial and final conditions Simulated hardware can affect the surrounding test system  Feedback Institute of Technical Informatics 26.07.17 5

24.11.15 24.11.15 Introduction 6 Example Scenario A sensor (DUT) is read out and charged via NFC by a robot The robot approaches with activated NFC field and tries to read data Data transmission fails due to long communication range The robot gets closer Data transmission suceeds The robot leaves the sensor Institute of Technical Informatics 26.07.17 6

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 7 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 7

Design Gazebo plugin to communicate with SystemC SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 8 Design Gazebo plugin to communicate with SystemC SystemC process is started by this plugin Communication between the processes via standard I/O Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 8

Requirements The simulation settings in SystemC must be configurable 24.11.15 24.11.15 Design 9 Requirements The simulation settings in SystemC must be configurable Commands and responses must be readable and generic SystemC testbed must be activated continuously Communication to affected parts must be possible Incoming commands must be executed in correct order Time between the simulations must be synchronized Simulation time and memory must be reduced as much as possible Institute of Technical Informatics 26.07.17 9

24.11.15 24.11.15 Design 10 Communication The Gazebo plugin restructures the internal communication and adds additional information The SystemC testbed parses the information and passes it to the correct components and adjusts simulation parameters The simulation sends infor- mation directly to the Gazebo simulation The Gazebo plugin needs to restructure the information to send it to the rest simulation Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 10

24.11.15 24.11.15 Design 11 Communication Gazebo starts the SystemC simulation and sends commands and a start signal SystemC sends status information during the simulation When the SystemC simulation is finished a signal to proceed is sent If the simulation should run longer, the Gazebo simulation again sends a start signal; otherwise an empty SystemC run is performed and both simulations are terminated Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 11

24.11.15 24.11.15 Design 12 Communication cont‘d To be as generic as possible the communication between the simulations is performed with XML Specific tags are necessary for configuring the SystemC environment, the communication between the simulations, and the triggering of new time steps Possible commands can look like this: Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 12

Simulation Time Reduction 24.11.15 24.11.15 Design 13 Simulation Time Reduction Normal SystemC operations are performed If all relevant components are in an Idle-state the changing parameters are estimated and changed The simulation is stopped and a signal that indicates that a discontinuity occurs is generated Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 13

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 14 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 14

SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 15 Evaluation A robot, equipped with NFC capabilities approaches the sensor This influences the channel and allows communication and energy transfer The sensor gets charged and transmits the sensor values to the robot Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 15

Parameters Can the robot communicate with the sensor at all? 24.11.15 24.11.15 Evaluation 16 Parameters Can the robot communicate with the sensor at all? How fast can this simulation approach be? What are bottlenecks of this simulation approach? Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 16

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 17 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 17

Results The robot is able to communicate with the sensor SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 18 Results The robot is able to communicate with the sensor The simulation gets much slower if the sensor needs to work  Time reduction works as expected Realtime factor: Gazebo alone: 0.8 Gazebo + SystemC idle: 0.5 Gazebo + SystemC running: 0.0005 Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 18

Identified Bottlenecks 24.11.15 24.11.15 Results 19 Identified Bottlenecks Multiple SystemC simulations are execured sequentially Parsing XML messages is slow SystemC generates huge maounts of data that need to be stored and processed Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 19

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 20 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 20

Conclusion Valid inputs for the sensor are generated SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 21 Conclusion Valid inputs for the sensor are generated Errors in the communication / execution are translated to errors appearing on the robot Erroneous states in the hardware can be found by matching the timestamp of the error message with the generated data Simultaneous simulation of many SystemC instances is very slow Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 21

Outline Introduction Design Evaluation Results Conclusion Future Work SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 22 Outline Introduction Design Evaluation Results Conclusion Future Work Institute of Technical Informatics 26.07.17 22

SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 23 Future Work Update plugin structure to communicate to a server and receive results in next time step Implement a server that searches for valid SystemC simulations to connect to Implement a structure to parallelize SystemC simulations Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 23

Acknowledgement SystemC Test Case Generation with the Gazebo Simulator 24.11.15 24.11.15 24 Acknowledgement This project has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 692480. This Joint Undertaking receives support from the European Union's Horizon 2020 research and innovation programme and Germany, Netherlands, Spain, Austria, Belgium, Slovakia. IoSense is funded by the Austrian Federal Ministry of Transport, Innovation and Technology (BMVIT) under the program "ICT of the Future" between May 2016 and May 2019. More information https://iktderzukunft.at/en/ Hugo Krawczyk and his co author Shai Halevi state in “Public-key Cryptography and Password Protocols“ (Aug. 99): [. . . ] using a low-entropy password as a key to a cryptographic function, can transform an otherwise strong function into a weak one. Namely, when using passwords as cryptographic keys, one makes the assumption that these functions remain secure even when the keys are chosen from a very small set. These assumptions are so unusual that [. . . ] no one has been able to formally dene the requirements from these cryptographic functions under which existing protocols can be proved secure. Institute of Technical Informatics 26.07.17 24

Thank you for your attention! 24.11.15 24.11.15 25 Thank you for your attention! 25