Advertisement

Upgrading Embedded Software in the Field: Dependability and Survivability

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2491)

Abstract

The new millennium heralds the convergence between computing, communication and the intelligent control of our physical environments. Computers embedded in roads, bridges, buildings and vehicles tend to have a long life cycle. Application needs will change and computing, communication and control technologies willevolve rapidly. To keep systems modern, we need technologies to dependably and securely upgrade embedded software in the field. This paper provides a review of our work on how to upgrade embedded control systems without shutting them down, and how to protect the system from bugs and attacks that could be introduced by software upgrades.

Keywords

Linear Matrix Inequality Symbolic Execution Memory Object Control Subsystem Recovery Region 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lim, S., Lee, K., and Sha, L., “Ensuring Integrity and Service Availability in a Web Based Control Laboratory,” Journal of Parallel and Distributed System, Special Issue on Security in Mission Critical Real-time Systems, Accepted for publications.Google Scholar
  2. 2.
    Software Fault Tolerance, edited by Michael Lyu, John Willey & Sons, 1999.Google Scholar
  3. 3.
    Mareczek, J., Buss, M., and Spong, M.W., “Invariance Control for a Class of Cascade Nonlinear Systems,” IEEE Trans. Automatic Control, to appear.Google Scholar
  4. 4.
    Mareczek, J., Buss, M., and Spong, M.W., “Invariance Control for Non-Cascade Nonlinear Systems,“ 2001 American Control Conference, Arlington, VA, May 2001.Google Scholar
  5. 5.
    Sha, L., “Using Simplicity to Control Complexity,” IEEE Software, July/August, 2001.Google Scholar
  6. 6.
    Sha L., Rajkumar, R., Sathaye, S., “Generalized Rate Monotonic Scheduling Theory: A Framework for Developing Real-Time Systems”, Proceedings of the IEEE, Vol. 82 No. 1, pp. 68–82, January 1994. (Invited paper)CrossRefGoogle Scholar
  7. 7.
    Sha, L., “Dependable System Upgrades”, Proceedings of IEEE Real Time System Symposium, 1998.Google Scholar
  8. 8.
    Spong, M.W., “Communication Delay and Control in Telerobotics,” Journal of the Japan Robotics Google Scholar
  9. 9.
    Rajkumar, R., Gagliardi, M., Sha, L., “The Real-Time Publisher/Subscriber Inter-Process Communication Model for Distributed Real-Time Systems: Design and Implementation”, Proceedings of the First IEEE Real-time Technology and Applications Symposium, pp. 66–75, May 1995.Google Scholar
  10. 10.
    Cliff Mercer, Ragunathan Rajkumar, and Jim Zelenka, “Temporal Protection in Real-Time Operating Systems”. In Proceedings of the 11th IEEE Workshop on Real-Time Operating Systems and Software, May 1994.Google Scholar
  11. 11.
    Boyd, S., Ghaoul, L. E., Feron, E., and Balakrishnan, V., “Linear Matrix Inequality in Systems and Control Theory”, SIAM Studies in Applied Mathematics. 1994.Google Scholar
  12. 12.
    Leveson, N. G., “Safeware: System Safety and Computers”, Addison Wesley, Sept. 1994.Google Scholar
  13. 13.
    Yeh, Y. C. (Bob), “Dependability of the 777 Primary Flight Control System”, the Proceedings of DCCA Conference, 1995.Google Scholar
  14. 14.
    Hashii, B., Lal, M., Pandey, R., and Samorodin, S., “Securing Systems Against External Programs,” IEEE Internet Computing, 2(6):35–45, Nov–Dec 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Lui Sha
    • 1
  1. 1.University of Illinois at Urbana-ChampaignUrbanaUSA

Personalised recommendations