© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 1 Administrative issues Lab 5 Friday, Feb. 10 th 13:00-15:00 (and 15:00-17:00)

Slides:



Advertisements
Similar presentations
Automotive Embedded System Development in AUTOSAR
Advertisements

Technology Drivers Traditional HPC application drivers – OS noise, resource monitoring and management, memory footprint – Complexity of resources to be.
Software Fault Tolerance (SWFT) How to Design, Develop and Evaluate Robust SW and OS’s Dependable Embedded Systems & SW Group
RECOMP is made possible by funding from the ARTEMIS Joint Undertaking. Claus Stellwag (Elektrobit), Thorsten Rosenthal (Delphi), Swapnil Gandhi (Delphi)
Lecture # 2 : Process Models
Software Fault Injection for Survivability Jeffrey M. Voas & Anup K. Ghosh Presented by Alison Teoh.
Yingping Huang and Gregory Madey University of Notre Dame A W S utonomic eb-based imulation Presented by Tariq M. King Published by the IEEE Computer Society.
What Great Research ?s Can RAMP Help Answer? What Are RAMP’s Grand Challenges ?
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
SWE Introduction to Software Engineering
1 RAKSHA: A FLEXIBLE ARCHITECTURE FOR SOFTWARE SECURITY Computer Systems Laboratory Stanford University Hari Kannan, Michael Dalton, Christos Kozyrakis.
Course Instructor: Aisha Azeem
Types and Techniques of Software Testing
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
MSc Education Supporting Infrastructure Emil Doychev Vladimir Valkanov University of Plovdiv Bulgaria.
Towards a Hardware-Software Co-Designed Resilient System Man-Lap (Alex) Li, Pradeep Ramachandran, Sarita Adve, Vikram Adve, Yuanyuan Zhou University of.
A Framework for Automated Web Application Security Evaluation
No: 1 CEMSIS 1 WP3 - Use of pre-developed products Key issues N. Thuy EDF R&D.
CPIS 357 Software Quality & Testing
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
ISA 562 Internet Security Theory & Practice
University of Coimbra, DEI-CISUC
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Chapter 6: Testing Overview Basic idea of testing - execute software and observe its behavior or outcome. If failure is observed, analyze execution record.
RTS Meeting 8th July 2009 Introduction Middleware AUTOSAR Conclusion.
Evaluating Erlang: Are High-level Languages suitable for Robust Telecoms Software? Jan Nystrom SafeCom'05 – Henry Nystrom, Phil Trinder, David King.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
High Performance Embedded Computing © 2007 Elsevier Lecture 5: Embedded Systems Issues Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte.
ITEA International Workshop on Challenges in Methodology, Representation, and Tooling for Automotive Embedded Systems, Berlin 2012 AMALTHEA Tool.
R R R 1 Frameworks III Practical Issues. R R R 2 How to use Application Frameworks Application developed with Framework has 3 parts: –framework –concrete.
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.
Chapter 6 Architectural Design.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
1 International Technology University CEN 951 Computer Architecture Lecture 1 - Introduction.
Title of Selected Paper: IMPRES: Integrated Monitoring for Processor Reliability and Security Authors: Roshan G. Ragel and Sri Parameswaran Presented by:
Testing Techniques Software Testing Module ( ) Dr. Samer Hanna.
Instrumentation in Software Dynamic Translators for Self-Managed Systems Bruce R. Childers Naveen Kumar, Jonathan Misurda and Mary.
RAI Information Brief Prospective from the RAI Working Group.
An Architecture and Prototype Implementation for TCP/IP Hardware Support Mirko Benz Dresden University of Technology, Germany TERENA 2001.
Comparing Java and.Net Security: Lessons Learned and Missed - Nathanael Paul, David Evans Presented by Dan Frohlich.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Graciela Saunders.  Introduction / Review  Challenges to Embedded Security  Approaches to Embedded Security  Security Analysis & Attack Taxonomy 
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
Security Vulnerabilities in A Virtual Environment
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
SensorWare: Distributed Services for Sensor Networks Rockwell Science Center and UCLA.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
CS223: Software Engineering Lecture 14: Architectural Patterns.
25/02/2016 SW Development Process - SW Architecture/Stefan L. Meier/Electronic Product Development SW Architecture EPD Software Development Process 1.
1 Security Architecture and Designs  Security Architecture Description and benefits  Definition of Trusted Computing Base (TCB)  System level and Enterprise.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Constraint Framework, page 1 Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Constraints approach.
CSCE 548 Secure Software Development Risk-Based Security Testing
Middleware Policies for Intrusion Tolerance
Intrusion Tolerant Systems Workshop: Anomaly Detection Group
Chapter 19: Architecture, Implementation, and Testing
FPGA: Real needs and limits
Пројектовање аутомобилског софтвера
NAAS 2.0 Features and Enhancements
THE ORANGE BOOK Ravi Sandhu
LAB 01 Installation of VIRTUAL MACHINE and LINUX
InCheck: An In-application Recovery Scheme for Soft Errors
Software Development Cycle
PLANNING A SECURE BASELINE INSTALLATION
Internet Engineering Course
Self-Managed Systems: an Architectural Challenge
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 1 Administrative issues Lab 5 Friday, Feb. 10 th 13:00-15:00 (and 15:00-17:00) Registration (mandatory!):

Assessing AUTOSAR: Inside future automotive software Part of the lecture “OS Dependability and Fault Tolerance”

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 3 AUTOSAR Architecture AUTOSAR is  Standardized software architecture  Layered  Component- / composition-based

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 4 AUTOSAR Architecture AUTOSAR is  Standardized software architecture  Layered  Component- / composition-based

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 5 Areas of Research Motivation: AUTOSAR / automotive systems are  Safety-relevant  Security-relevant  Robustness Evaluation  Fault injection  Error propagation analysis  Security Testing  Robustness and Security Enhancers  Run-time monitoring  Flexible instrumentation with injectors and detectors required

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 6 Instrumentation of AUTOSAR Components Interface wrappers  Clone original interface  Hide original interface  Implement added functionality in clone  Call original interface from clone Example AUTOSAR model

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 7 Instrumentation of AUTOSAR Components AUTOSAR model AUTOSAR implementation: Varied data flow paths Mixed black-box and white-box components

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 8 Challenges  Flexibility  Different locations in SW stack  Variety of applications (FI, monitoring, etc.)  Grey-box system, mixes  Black-box components  White-box components  Systematic and automatic  Tool-independent  Vendor-independent

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 9 Student Projects  Instrumentation Framework (Paul Manns)  AUTOSAR model (ARXML) as input  Configuration on the model level (vs. implementation level)  Supports Application and RTE layers  Instrumentation of.c-files,.h-files,.o-files (black-box, grey-box, white-box)  Instrumenting BSW components (Manuel Pütz)  BSW description not part of ARXML  Different granularity  Monitor and inject (sub-)system-wide

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 10 Student Projects  Fault Injection Framework (Michael Tretter)  Development of a generic, adaptive FI framework  High degree of abstraction  Wide variety of fault-models  Proof-of-concept for AUTOSAR  Security Testing (Jannik Kappes)  Vulnerability analysis and classification  Current approaches (Koscher’10, Checkoway’11) target external attack surfaces  complex, undirected  Testing at component level allows for finer granularity

© DEEDS – OS Course WS11/12 Lecture 13 – OS Dependability and Fault Tolerance 11 Outlook Assessment of AUTOSAR 4 safety features:  Mixed criticality systems  Memory partitioning / protection  User- / supervisor-modes  Deterministic timing of SW components  Detect and control timing violations  Prevent their propagation  Control-flow monitoring  Based on Watchdog and checkpoints  We offer seminar and thesis works in these areas