Currently browsing category

Allgemein

20th of February, 2017: Model-based Functional Safety

Speaker: Prof. Stefan Leue, Chair for Software and Systems Engineering, University Konstanz Title: Model-based Functional Safety Abstract: Ensuring the functional safety of critical software-driven embedded or cyber-physical systems is a prime engineering challenge. Domain standards, such as DO-178 B/C or ISO 26262, strongly recommend the use of automated analysis techniques and …

15th of November, 2016: Contract-Based Deployment of Monitoring Mechanisms for Mixed-Critical Real-Time Applications

Speaker: Joscha-Joel Benz, TU Braunschweig Title: Contract-Based Deployment of Monitoring Mechanisms for Mixed-Critical Real-Time Applications Abstract: Today, mixed-critical embedded systems are increasing in their functionality and complexity, such as cars and mobile phones. Consequently, the complexity of software rises as well. Thus, already deployed software often needs to be adapted to …

15th of September, 2016: From tamed heterogeneous cores to system wide intrusion tolerance

Speaker: Marcus Völp, Interdisciplinary Centre for Security, Reliability and Trust, Université du Luxembourg Title: From tamed heterogeneous cores to system wide intrusion tolerance Abstract: After having seen the transition from increasing processor speeds to increasing system-level parallelism and after realizing that energy, not the transistor budget is the limiting factor, a …

10th of June, 2016: Dependable System Software by Construction

Speaker:Daniel Lohmann, Associate Professor (Privatdozent) at the Chair of Computer Science IV (Distributed Systems and Operating Systems), Friedrich-Alexander-Universität Erlangen-Nürnberg Title: Dependable System Software by Construction Abstract: Because of shrinking structure sizes and operating voltages, computing hardware exhibits an increasing susceptibility against transient hardware faults: Issues previously only known from avionics systems, …

24th of May, 2016: Graph-Mining zur Schwachstellensuche

Speaker: Prof. Dr. Konrad Rieck, Institute of System Security Title: Graph-Mining zur Schwachstellensuche Abstract: Die Erkennung von Schwachstellen in Software ist ein Schlüssel zum Schutz von IT-Systemen. Leider können nur wenige Arten von Sicherheitsfehlern automatisch erkannt werden. Die meisten Schwachstellen werden nur durch eine aufwändige manuelle Analyse entdeckt, wie zum …

10th of May, 2016: Network Calculus with Compact Domains

Speaker: Kai Lampka, Department of Information Technology, Uppsala University Title: Network Calculus with Compact Domains Abstract: Real-time Calculus (RTC) aims at tightly bounding  end-to-end flow delays and buffer requirements for distributed real-time systems. Workload is modelled per event stream and service is modelled per component. RTC then transforms this system …

February 17th, 2016: Hardware-supported Contracting for Executing Mixed-Criticality Tasks in Power-Constrained Heterogeneous Cyber-Physical Systems

Speaker: Prof.  Mladen Berekovic Title: Hardware-supported Contracting for Executing Mixed-Criticality Tasks in Power-Constrained Heterogeneous Cyber-Physical Systems About: Motivated by dynamic and demanding robot applications, this project focuses on power-aware contract-based task distribution in a scalable, heterogeneous, loosely coupled execution environment. Contracts are negotiated based on application requirements, compute node capabilities, …

February 3rd, 2016: Two-Dimensional Reallocation

Speaker: Jan-Marc Reinhardt Title: STwo-Dimensional Reallocation About: In the presence of dynamic insertions and deletions into a partially reconfigurable FPGA, fragmentation is unavoidable. This poses the challenge of developing efficient approaches to dynamic defragmentation and reallocation. One key aspect is to develop efficient algorithms and data structures that exploit the …

January 26th, 2016: Sicherheitsrelevante Softwareupdates in Kraftfahrzeugen

Speaker: Hr. Udo Steininger, Leiter Assistiertes und Automatisiertes Fahren beim TÜV SÜD Autoservice GmbH Title: Sicherheitsrelevante Softwareupdates in Kraftfahrzeugen About: Rechtsgrundlagen für das Inverkehrbringen und den Betrieb von Kraftfahrzeugen Grundsätzlicher Umgang mit Änderungen Übliche Praxis / Beispiele / Dos & Don‘ts

January 21st, 2016: Investigation, Evaluation and Test of Scheduling Parameter Negotiation for Real-Time Constraints in Distributed Systems

Speaker: Robin Hoffmann Title: Investigation, Evaluation and Test of Scheduling Parameter Negotiation for Real-Time Constraints in Distributed Systems (Master Thesis) Abstract: Embedded systems are often distributed among several nodes within their systems. The nodes in such systems are physically disjoint and communicate via a network or a bus to accomplish …

January 11th, 2016: The Secure Communication Module of CCC

Speaker: Mohammad Hamad (B4) Title: The Secure Communication Module of CCC Abstract: One goal of B4 project is developing the communications security architecture for the entire system to control over all communication links. To achieving this target, firstly we have implemented the secure network stack by rewriting the Genode IP …

October 22nd, 2015: Resource synchronization protocols and design optimization techniques for Mixed-criticality CPS

Speaker: Zhao Qingling (Zhejiang University) Title: Resource synchronization protocols and design optimization techniques for Mixed-criticality CPS Abstract: In Today’s complex Cyber-Physical Systems(CPS), designers often need to integrate multiple applications with varying levels of criticality on the same hardware platform to form a Mixed-Criticality System. Mixed-Criticality Scheduling (MCS) is a type …

January 29th, 2015: Connecting Reconfigurable Hardware to CCC Framework

Speaker: Min Xu Title: Connecting Reconfigurable Hardware to CCC Framework Abstract: Reconfigurable computing system optimally compromises between cost and performance, and thus is widely applied in consumer and industrial electronics. In the state-of-the-art reconfigurable implementations, FPGA is used as a container of time-variant IP-cores. Under this type of system structure …

December 11th, 2014: Contract Specification and language

Speaker: Martin Wegner, Sönke Holthusen Title: Contract Specification & Language Abstract: In this seminar talk, the contract specification as part of the progress made in W2 will be presented. The smallest entity added to a system running the CCC environment will be called a function. Attributes will be presented in …

November 14th, 2014: RACE – Plug&Play for Safety-Critical Automotive Systems

Speaker: Christian Buckl, Klaus Becker fortiss GmbH, An-Institut Technische Universität München Title: RACE – Plug&Play for Safety-Critical Automotive Systems Abstract: In today’s vehicles, the majority of the functional features is realized by software. This trend will be reinforced by the integration of additional safety-critical Advanced Driver Assistance Systems, what also increases …

October 30th, 2014: Model-Based Software Component Management ForThe Dynamic Reconfiguration Of Component-Based Embedded Systems

Speaker: Jan Rohde Title:  Model-Based Software Component Management ForThe Dynamic Reconfiguration Of Component-Based Embedded Systems Abstract: A software platform, which enables dynamic reconfiguration of component-based embedded systems is currently being developed at the IDA within the „Controlling Concurrent Change“ project. The reconfiguration procedure assures that the high requirements with respect to …

September 11th, 2014 Functional System Architecture for an Autonomous Driving On-Road Vehicle

Speaker: Richard Matthaei Title: Functional System Architecture for an Autonomous Driving On-Road Vehicle Abstract: Based on a definition of the functional requirements on an autonomous driving on-road vehicle a funtional system architecture is proposed. Both, the functional requirements and the functional system architecture, consider the disciplines operating by a human being, …

July 25th, 2014: Timing analysis and model based design: looking inside the task model

Speaker: Marco Di Natale, Scuola Superiore Sant’Anna, Pisa Title: Timing analysis and model based design: looking inside the task model Abstract:Most schedulability analysis results are based on the assumption of a task model representing a code implementation of some time-critical functionality.  With the advent of model-based design, however, the analysis …

May 15th, 2014 Compositional Verification of Software Product Lines

Speaker: Ina Schaefer Title: Compositional Verification of Software Product Lines Abstract: Software product line engineering allows large software systems to be developed and adapted for varying customer needs. The products of a software product line can be described by means of a hierarchical variability model specifying the commonalities and variabilities …

March 6th, 2014 Towards an IT Security Framework for Railway Automation

Speaker: Jens Braband Title: Towards an IT Security Framework for Railway Automation Abstract: Some recent incidents have shown that possibly the vulnerability of IT systems in railway automation has been underestimated. Fortunately, so far, almost only denial-of-service attacks have been successful, but due to several trends, such as the use of …

February 20th, 2014 A Library-Level Acess Control Mechanism

Speaker: Vassilis Prevelakis Title: A Library-Level Acess Control Mechanism Abstract: The problem of confining the execution of a process is well known. Traditional mechanisms such the Unix uid-based access control mechanism are too corse-grained (is it OK for your web browser to delete all your files?) while containment mechanisms such …

January 23rd, 2014: MOBILE

Speaker: Torben Stolte Title: MOBILE – an introduction to one of the most powerful electric cars in the world Abstract: The over-actuated research vehicle MOBILE – designed and build at the Institute of Control Engineering at TU Braunschweig – will serve as demonstrator for the application of CCC findings in …

December 19, 2013: Virtual Integration of Real-Time Systems based on Resource Segregation Abstraction

Speaker: Ingo Stierand Title: Virtual Integration of Real-Time Systems based on Resource Segregation Abstraction Abstract: Embedded safety-critical systems must not only be functionally correct but must also provide timely service.  It is thus important to have rigorous analysis techniques for determining timing properties of such systems.  We consider a layered design processes, where …

November 28, 2013: Transparent Replication as an Operating System Service

Speaker: Björn Döbel Title: Transparent Replication as an Operating System Service Abstract: Many existing approaches to building fault-tolerant systems either rely on custom-tailored hardware or use compiler-level techniques to generate fault-tolerant program code. While dedicated hardware solutions are generally applicable to all software, they are usually too is ableexpensive to be used in the …

November 14, 2013: Platform-independent coding for embedded systems (the Wiselib)

Speaker: Henning Hasemann Title: Platform-independent coding for embedded systems (the Wiselib) Abstract: When developing Algorithms for embedded devices, two challenges arise: On the one hand, embedded devices pose several practical issues such as severe hardware constraints and the need for communication despite heterogeneity. On the other hand, embedded networks pose an interesting field …