(WIP) Towards Automated Identification of Layering Violations in Embedded Applications
For portability, embedded systems software follows a layered design to reduce dependence on particular hardware behavior. We consider the problem of identifying layering violations: instances where the embedded application accesses non-adjacent layers. This paper presents our preliminary work to detect a class of layering violations called Non Conventional MMIO Accesses (NCMAs). We find them by searching for direct Memory Mapped Input Output (MMIO) accesses made outside of the Hardware Abstraction Layer (HAL). For evaluation, we curated a list of 988 applications spanning 5 Real Time Operating Systems (RTOSes) – the first large dataset of compilable embedded applications. Our system identified 380 NCMAs. We reported these issues to the corresponding developers and found interesting reasons for committing layering violations. We have open-sourced our tool and the collected dataset to foster future research.
Sun 18 JunDisplayed time zone: Eastern Time (US & Canada) change
14:00 - 15:30 | |||
14:00 20mTalk | Sequential Scheduling of Dataflow Graphs for Memory Peak Minimization LCTES DOI | ||
14:20 20mTalk | PinIt: Influencing OS Scheduling via Compiler-Induced Affinities in Embedded Media ServersVirtual LCTES Girish Mururu Georgia Institute of Technology, vincentni , Ada Gavrilovska , Santosh Pande Georgia Institute of Technology DOI | ||
14:40 10mTalk | (WIP) Towards Secure MicroPython on Morello LCTES Jeremy Singer University of Glasgow DOI Pre-print | ||
14:50 10mTalk | (WIP) Towards Automated Identification of Layering Violations in Embedded Applications LCTES DOI Pre-print | ||
15:00 10mTalk | (WIP) Tiling for DMA-Based Hardware AcceleratorsVirtual LCTES DOI |