With the advent of increasingly complex hardware in real-time embedded systems (processors with performance enhancing features such as pipelines, cache hierarchy, multiple cores), many processors now have a set-associative L2 cache. Thus, there is a need for considering cache hierarchies when validating the temporal behavior of real-time systems, in particular when estimating tasks' worst-case execution times (WCETs). To the best of our knowledge, there is only one approach for WCET estimation for systems with cache hierarchies [Mueller, 1997], which turns out to be unsafe for set-associative caches. In this paper, we highlight the conditions under which the approach described in [Mueller, 1997] is unsafe. A safe static instruction cache an...
International audienceSafety-critical systems require guarantees on their worst-case execution times...
International audienceOn real-time systems running under timing constraints, scheduling can be perfo...
Cache memories have been extensively used to bridge the gap between high speed processors and relati...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
International audienceNowadays, the presence of cache hierarchies tends to be a common trend in proc...
Nowadays, the presence of cache hierarchies tends to be a common trend in processor architectures, e...
Nowadays, the presence of cache hierarchies tends to be a common trend in processor architectures, e...
International audienceWith the advent of increasingly complex hardware in real-time embedded systems...
Worst-case execution time (WCET) analysis of systems with data caches is one of the key challenges i...
Multi-core chips have been increasingly adopted by the microprocessor industry. For real-time system...
Safety critical real-time applications in aviation, automotive and industrial automation have to gua...
Cache memories have been introduced to decrease the access time to the information due to the increa...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
One of the key challenges in real-time systems is the analysis of the memory hierarchy. Many Worst-C...
International audienceSafety-critical systems require guarantees on their worst-case execution times...
International audienceOn real-time systems running under timing constraints, scheduling can be perfo...
Cache memories have been extensively used to bridge the gap between high speed processors and relati...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
International audienceNowadays, the presence of cache hierarchies tends to be a common trend in proc...
Nowadays, the presence of cache hierarchies tends to be a common trend in processor architectures, e...
Nowadays, the presence of cache hierarchies tends to be a common trend in processor architectures, e...
International audienceWith the advent of increasingly complex hardware in real-time embedded systems...
Worst-case execution time (WCET) analysis of systems with data caches is one of the key challenges i...
Multi-core chips have been increasingly adopted by the microprocessor industry. For real-time system...
Safety critical real-time applications in aviation, automotive and industrial automation have to gua...
Cache memories have been introduced to decrease the access time to the information due to the increa...
Artificial Software Diversity is a well-established method to increase security of computer systems ...
One of the key challenges in real-time systems is the analysis of the memory hierarchy. Many Worst-C...
International audienceSafety-critical systems require guarantees on their worst-case execution times...
International audienceOn real-time systems running under timing constraints, scheduling can be perfo...
Cache memories have been extensively used to bridge the gap between high speed processors and relati...