Testing Embedded Systems Software using Open Source Virtual Platforms

2010 ◽  
Author(s):  
A. Bastoni ◽  
P. Boschi ◽  
F. Batino ◽  
C. Di Biagio ◽  
L. Recchia

This research focuses on deliver a SDS implementation model that facilitate the definition of requirements to be delivered in a timely manner to systems. Software Defined Storage (SDS) enables different hardware technologies to be homogenized and deliver independent storage. The technologies included on the implementation model are the open-source projects Red Hat Gluster Storage and Red Hat Ceph Storage. Both technologies are integrated into a virtualization platform, it is compared at a functional and economic level with respect to some enterprise solutions and it is shown that the same operations are performed as a viable technological alternative. The favorable results of the model are presented and the great benefit that open-source technologies have open scope that allows it to be integrated into other projects is presented.


Author(s):  
Michael Kramer ◽  
Martin Horauer

Embedded Systems software reliability is increasingly important, therefore methods to harden existing software are needed. In general, hardening software against various failures is a necessity in modern computer systems. A lot of work has been published regarding many possible ways to achieve this non-functional requirement. Relevant topics include, e.g., test procedures, recommended development flows, and hardware measures like watchdog timers. One of these methods seems very promising to be software implemented in modern embedded systems: Control Flow Checking by signatures. Various authors have shown the effectiveness and feasibility of Control Flow Checking (CFC) by signatures for personal computer software. For instance it has been shown for standard computer-systems, that CFC is capable of reducing undetected control flow errors by at least one magnitude. This survey will focus on the applicability of such software hardening methods to embedded systems, while adhering mainly to software based approaches. Published methods will be summarized and compared. Furthermore methods to simplify derived control-flow graphs to essential states will be emphasized. Finally the possibility to apply run-time verification to the Control-flow Checking Software is considered.


Sign in / Sign up

Export Citation Format

Share Document