Embedded Computing Systems (TECS)


Search Issue
enter search term and/or author name


Editorial: Continuing the Course
Sandeep K. Shukla
Article No.: 28
DOI: 10.1145/3043965

Section: Editorial

Guest Editorial: Special Issue on LCTES 2015
Sebastian Fischmeister, Jason Xue
Article No.: 29
DOI: 10.1145/3041038

Detecting Software Cache Coherence Violations in MPSoC Using Traces Captured on Virtual Platforms
Marcos Aurélio Pinto Cunha, Omayma Matoussi, Frédéric Pétrot
Article No.: 30
DOI: 10.1145/2990193

Software cache coherence schemes tend to be the solution of choice in dedicated multi/many core systems on chip, as they make the hardware much simpler and predictable. However, despite the developers’ effort, it is hard to make sure that...

Dynamic Data-Cache Locking for Minimizing the WCET of a Single Task
Wenguang Zheng, Hui Wu
Article No.: 31
DOI: 10.1145/2994602

Caches have been widely used in modern embedded processors to bridge the increasing speed gap between processors and off-chip memory. In real-time embedded systems, computing the Worst-Case Execution Time (WCET) of a task is essential for the task...

Compiler-Directed Soft Error Detection and Recovery to Avoid DUE and SDC via Tail-DMR
Qingrui Liu, Changhee Jung, Dongyoon Lee, Devesh Tiwari
Article No.: 32
DOI: 10.1145/2930667

This article presents Clover, a compiler-directed soft error detection and recovery scheme for lightweight soft error resilience. The compiler carefully generates soft-error-tolerant code based on idempotent processing without explicit...

A Principled Approach to Secure Multi-core Processor Design with ReWire
Adam Procter, William L. Harrison, Ian Graves, Michela Becchi, Gerard Allwein
Article No.: 33
DOI: 10.1145/2967497

There is no such thing as high assurance without high assurance hardware. High assurance hardware is essential because any and all high assurance systems ultimately depend on hardware that conforms to, and does not undermine, critical system...

Eager Synching: A Selective Logging Strategy for Fast fsync() on Flash-Based Android Devices
Li-Pin Chang, Po-Han Sung, Po-Tsang Chen, Po-Hung Chen
Article No.: 34
DOI: 10.1145/2930668

Flash storage has been a standard component in Android devices. Recent research has reported that application data management in Android involves frequent fsync() operations. The current fsync() implementations, including those of ext4 and F2FS,...

Global Optimization of Fixed-Priority Real-Time Systems by RTOS-Aware Control-Flow Analysis
Christian Dietrich, Martin Hoffmann, Daniel Lohmann
Article No.: 35
DOI: 10.1145/2950053

Cyber--physical systems typically target a dedicated purpose; their embedded real-time control system, such as an automotive control unit, is designed with a well-defined set of functionalities. On the software side, this results in a large amount...

Minimizing Cost of Scheduling Tasks on Heterogeneous Multicore Embedded Systems
Jing Liu, Kenli Li, Dakai Zhu, Jianjun Han, Keqin Li
Article No.: 36
DOI: 10.1145/2935749

Cost savings are very critical in modern heterogeneous computing systems, especially in embedded systems. Task scheduling plays an important role in cost savings. In this article, we tackle the problem of scheduling tasks on heterogeneous...

From a Formalized Parallel Action Language to Its Efficient Code Generation
Ivan Llopard, Christian Fabre, Albert Cohen
Article No.: 37
DOI: 10.1145/2990195

Modeling languages propose convenient abstractions and transformations to handle the complexity of today’s embedded systems. Based on the formalism of the Hierarchical State Machine, they enable the expression of hierarchical control...

Free Rider: A Source-Level Transformation Tool for Retargeting Platform-Specific Intrinsic Functions
Stanislav Manilov, Björn Franke, Anthony Magrath, Cedric Andrieu
Article No.: 38
DOI: 10.1145/2990194

Short-vector Simd and Dsp instructions are popular extensions to common Isas. These extensions deliver excellent performance and compact code for some compute-intensive applications, but they require specialized...

System-Level Design Optimization for Security-Critical Cyber-Physical-Social Systems
Jing Zeng, Laurence T. Yang, Man Lin, Zili Shao, Dakai Zhu
Article No.: 39
DOI: 10.1145/2925991

Cyber-physical-social systems (CPSS), an emerging computing paradigm, have attracted intensive attentions from the research community and industry. We are facing various challenges in designing secure, reliable, and user-satisfied CPSS. In this...

Section: Editorial

Message from the Guest Editors
Stefan Haar, Roland Meyer
Article No.: 40
DOI: 10.1145/3037413

Testing Preorders for dMTS: Deadlock- and the New Deadlock-/DivergenceTesting
Ferenc Bujtor, Lev Sorokin, Walter Vogler
Article No.: 41
DOI: 10.1145/2984641

Testing preorders on component specifications ensure that replacing a specification by a refined one does not introduce unwanted behavior in an overall system. Considering deadlocks as unwanted, the preorder can be characterized by a failure...

Multi-valued Simulation and Abstraction Using Lattice Operations
Stefan Vijzelaar, Wan Fokkink
Article No.: 42
DOI: 10.1145/3012282

Abstractions can cause spurious results, which need to be verified in the concrete system to gain conclusive results. Verification based on a multi-valued logic can distinguish between conclusive and inconclusive results, provides increased...

Preserving Partial-Order Runs in Parametric Time Petri Nets
Étienne André, Thomas Chatain, César Rodríguez
Article No.: 43
DOI: 10.1145/3012283

Parameter synthesis for timed systems aims at deriving parameter valuations satisfying a given property. In this article, we target concurrent systems. We use partial-order semantics for parametric time Petri nets as a way to both cope with the...

Non-interference in Partial Order Models
Béatrice Bérard, Loïc Hélouët, John Mullins
Article No.: 44
DOI: 10.1145/2984639

Non-interference (NI) is a property of systems stating that confidential actions should not cause effects observable by unauthorized users. Several variants of NI have been studied for many types of models but rarely for true concurrency or...

Minimizing Test Suites with Unfoldings of Multithreaded Programs
Olli Saarikivi, Hernán Ponce-De-León, Kari Kähkönen, Keijo Heljanko, Javier Esparza
Article No.: 45
DOI: 10.1145/3012281

This article focuses on computing minimal test suites for multithreaded programs. Based on previous work on test case generation for multithreaded programs using unfoldings, this article shows how this unfolding can be used to generate minimal...

Stop It, and Be Stubborn!
Antti Valmari
Article No.: 46
DOI: 10.1145/3012279

This publication discusses how automatic verification of concurrent systems can be made more efficient by focusing on always may-terminating systems. First, making a system always may-terminating is a method for meeting a modelling need...

Incremental Inductive Verification of Parameterized Timed Systems
Tobias Isenberg
Article No.: 47
DOI: 10.1145/2984640

We propose and extend an approach for the verification of safety properties for parameterized timed systems modeled as networks of timed automata. For this task, we introduce an incremental workflow that is based on our algorithm IC3 with...

When Do We Not Need Complex Assume-Guarantee Rules?
Antti Siirtola, Stavros Tripakis, Keijo Heljanko
Article No.: 48
DOI: 10.1145/3012280

We study the need for complex circular assume-guarantee (AG) rules in formalisms that already provide the simple precongruence rule. We first investigate the question for two popular formalisms: Labeled Transition Systems (LTSs) with weak...

Task-FIFO Co-Scheduling of Streaming Applications on MPSoCs with Predictable Memory Hierarchy
Qi Tang, Twan Basten, Marc Geilen, Sander Stuijk, Ji-Bo Wei
Article No.: 49
DOI: 10.1145/3038484

This article studies the scheduling of real-time streaming applications on multiprocessor systems-on-chips with predictable memory hierarchy. An iteration-based task-FIFO co-scheduling framework is proposed for this problem. We obtain FIFO size...

Section: Editorial

Embedded Device Forensics and Security
Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang, Yu Yu
Article No.: 50
DOI: 10.1145/3015662

While the increasing digitalization of our society and amalgamation of embedded devices into the ever-increasing facets of our daily life (e.g., in smart and intelligent vehicles, smart cities and smart nations, and critical infrastructure...

DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream
Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen
Article No.: 51
DOI: 10.1145/2937755

Applications in risk-critical domains such as emergency management and industrial control systems need near-real-time stream data processing in large-scale sensing networks. The key problem is how to ensure online end-to-end security (e.g.,...

SIPF: A Secure Installment Payment Framework for Drive-Thru Internet
Jun Song, Fan Yang, Kim-Kwang Raymond Choo, Zhijian Zhuang, Lizhe Wang
Article No.: 52
DOI: 10.1145/3014584

Ensuring the security and privacy of vehicular ad hoc networks (VANETs) and related services such as secure payment has been the focus of recent research efforts. Existing secure payment solutions generally require stable and reliable network...

Efficient Elliptic Curve Cryptography for Embedded Devices
Zhe Liu, Jian Weng, Zhi Hu, Hwajeong Seo
Article No.: 53
DOI: 10.1145/2967103

Many resource-constrained embedded devices, such as wireless sensor nodes, require public key encryption or a digital signature, which has induced plenty of research on efficient and secure implementation of elliptic curve cryptography (ECC) on...

Differential Fault Attack on ITUbee Block Cipher
Shan Fu, Guoai Xu, Juan Pan, Zongyue Wang, An Wang
Article No.: 54
DOI: 10.1145/2967610

Differential Fault Attack (DFA) is a powerful cryptanalytic technique to retrieve secret keys by exploiting the faulty ciphertexts generated during encryption procedure. This article proposes a novel DFA attack that is effective on ITUbee,...

Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers
Yang Li, Mengting Chen, Zhe Liu, Jian Wang
Article No.: 55
DOI: 10.1145/3014583

In 2014, a new fault analysis called blind fault attack (BFA) was proposed, in which attackers can only obtain the number of different faulty outputs without knowing the public data. The original BFA requires 480,000 fault injections to...

On-Board Format-Independent Security of Functional Magnetic Resonance Images
Arcangelo Castiglione, Raffaele Pizzolante, Francesco Palmieri, Barbara Masucci, Bruno Carpentieri, Alfredo De Santis, Aniello Castiglione
Article No.: 56
DOI: 10.1145/2893474

Functional magnetic resonance imaging (fMRI) provides an effective and noninvasive tool for researchers to understand cerebral functions and correlate them with brain activities. In addition, with the ever-increasing diffusion of the Internet,...

Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design
Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang, Li Xu
Article No.: 57
DOI: 10.1145/2983625

Electronic healthcare (eHealth) systems have replaced traditional paper-based medical systems due to attractive features such as universal accessibility, high accuracy, and low cost. As a major constituent part of eHealth systems, mobile...

Securely Reinforcing Synchronization for Embedded Online Contests
Wei Wang, Peng Xu, Laurence Tianruo Yang, Willy Susilo, Jinjun Chen
Article No.: 58
DOI: 10.1145/2899000

When competing in eBay bidding, online games, or e-exams in embedded computing environments, people naturally face asynchronous starts from different computing devices, which is treated as a security risk of online contests. The security risks of...

Fault Detection Architectures for Post-Quantum Cryptographic Stateless Hash-Based Secure Signatures Benchmarked on ASIC
Mehran Mozaffari-Kermani, Reza Azarderakhsh, Anita Aghaie
Article No.: 59
DOI: 10.1145/2930664

Symmetric-key cryptography can resist the potential post-quantum attacks expected with the not-so-faraway advent of quantum computing power. Hash-based, code-based, lattice-based, and multivariate-quadratic equations are all other potential...

SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing
Keke Gai, Longfei Qiu, Min Chen, Hui Zhao, Meikang Qiu
Article No.: 60
DOI: 10.1145/2979677

The expected advanced network explorations and the growing demand for mobile data sharing and transferring have driven numerous novel applications in Cyber-Physical Systems (CPSs), such as Intelligent Transportation Systems (ITSs)....

Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems
Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu
Article No.: 61
DOI: 10.1145/3007211

Smart mobile devices are becoming the main vessel of personal privacy information. While they carry valuable information, data erasure is somehow much more vulnerable than was predicted. The security mechanisms provided by the Android system are...