International audienceCertification of safety-critical systems requires a separation of certified and non-safe components. Up to today, partitioning operating systems, that have the capability to isolate software components in safety-critical systems, are almost exclusively found in complex embedded systems with standardized runtime environments, e.g. in the avionic industry. On the other hand, their use is highly uncommon in deeply-embedded systems, that are frequently characterized by severe power, memory, and latency constraints. Here we show, how partitioning can be efficiently provided in deeply-embedded systems. For this purpose, we propose a framework for highly customized and constrained embedded devices, which achieves the separati...
The increasing complexity of software poses signicant challenges for real-time and embedded systems ...
Safety-critical systems and certification standards are the bare essential elements for the developm...
We consider the problem of how to provide an execution environment where the application's secrets a...
Application download is a promising concept for embedded systems in safety-critical domains such as ...
Mapping of software onto hardware elements under platform resource constraints is a crucial step in ...
Mapping of software onto hardware elements under platform resource constraints is a crucial step in ...
A promising approach for designing critical embedded systems is based on virtualization technologies...
The current approach to developing mixed-criticality sys- tems is by partitioning the hardware resou...
Mechatronic systems request for high reliability, especially in the context of time where mostly har...
International audienceDesign and verification of Distributed Real-time Embedded (DRE) systems are cr...
Embedded systems are becoming pervasive in diverse application domains such as automotive, avionic, ...
Modern software development in the automotive domain would be unthinkable without leveraging reusabl...
The size and complexity of modern applications are the underlying causes of numerous security vulner...
Some industrial domains, characterized by particularly strict safety standards – e.g., avionics – a...
In this paper we are interested in implementing mixed-criticality real-time embedded applications on...
The increasing complexity of software poses signicant challenges for real-time and embedded systems ...
Safety-critical systems and certification standards are the bare essential elements for the developm...
We consider the problem of how to provide an execution environment where the application's secrets a...
Application download is a promising concept for embedded systems in safety-critical domains such as ...
Mapping of software onto hardware elements under platform resource constraints is a crucial step in ...
Mapping of software onto hardware elements under platform resource constraints is a crucial step in ...
A promising approach for designing critical embedded systems is based on virtualization technologies...
The current approach to developing mixed-criticality sys- tems is by partitioning the hardware resou...
Mechatronic systems request for high reliability, especially in the context of time where mostly har...
International audienceDesign and verification of Distributed Real-time Embedded (DRE) systems are cr...
Embedded systems are becoming pervasive in diverse application domains such as automotive, avionic, ...
Modern software development in the automotive domain would be unthinkable without leveraging reusabl...
The size and complexity of modern applications are the underlying causes of numerous security vulner...
Some industrial domains, characterized by particularly strict safety standards – e.g., avionics – a...
In this paper we are interested in implementing mixed-criticality real-time embedded applications on...
The increasing complexity of software poses signicant challenges for real-time and embedded systems ...
Safety-critical systems and certification standards are the bare essential elements for the developm...
We consider the problem of how to provide an execution environment where the application's secrets a...