1,065
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Analyzing execution path non-determinism of the Linux kernel in different scenarios

, , , , &
Article: 2192442 | Received 14 Dec 2022, Accepted 14 Mar 2023, Published online: 03 Apr 2023

References

  • Albanese, G., Birke, R., Giannopoulou, G., Schönborn, S., & Sivanthi, T.2021). Evaluation of networking options for containerized deployment of real-time applications. In 2021 26th IEEE international conference on emerging technologies and factory automation (ETFA) (pp. 1–8). IEEE Press.
  • Allende, I. (2022). Statistical path coverage for non-deterministic complex safety-related software testing.
  • Allende, I., Mc Guire, N., Perez, J., Monsalve, L. G., Fernández, J., & Obermaisser, R. (2021). Estimation of Linux kernel execution path uncertainty for safety software test coverage. In 2021 design, automation & test in europe conference & exhibition (date). IEEE.
  • Allende, I., Mc Guire, N., Perez, J., Monsalve, L. G., & Obermaisser, R. (2021). Towards Linux based safety systems–a statistical approach for software execution path coverage. Journal of Systems Architecture, 116, Article 102047. North-Holland, Inc.: Elsevier. https://doi.org/10.1016/j.sysarc.2021.102047
  • Allende, I., Mc Guire, N., Perez, J., Monsalve, L. G., Uriarte, N., & Obermaisser, R. (2019). Towards Linux for the development of mixed-criticality embedded systems based on multi-core devices. In 2019 15th european dependable computing conference (EDCC) (pp. 47–54). IEEE.
  • Baron, C., & Louis, V. (2021). Towards a continuous certification of safety-critical avionics software. Computers in Industry, 125, Article 103382. ISSN 0166-3615. https://doi.org/10.1016/j.compind.2020.103382
  • Beamonte, R., Ezzati-Jivan, N., & Dagenais, M. R. (2022). Execution trace-based model verification to analyze multicore and real-time systems. Concurrency and Computation: Practice and Experience, 34(17), e6974. https://doi.org/10.1002/cpe.v34.17
  • Bell, R. (1999). IEC 61508: Functional safety of electrical/electronic/ programme electronic safety-related systems: Overview. In IEE colloquium control of major accidents and hazards directive (comah)–implications for electrical and control engineers (ref. no. 1999/173) (pp. 5/1–5/5). IET.
  • Black, J., Cochran, M., & Highland, T. (2006). A study of the MD5 attacks: Insights and improvements. In M. Robshaw (Ed.), Fast software encryption (pp. 262–277). Springer Berlin Heidelberg.
  • Borrego-Carazo, J., Castells-Rufas, D., Biempica, E., & Carrabina, J. (2020). Resource-constrained machine learning for ADAS: A systematic review. IEEE Access, 8, 40573–40598. IEEE Press. https://doi.org/10.1109/Access.6287639
  • Cummings, M., & Britton, D. (2020). Regulating safety-critical autonomous systems: Past, present, and future perspectives. In Living with robots (pp. 119–140). Elsevier.
  • de Guzman, L. B., Sison, A. M., & Medina, R. P. (2019). Implementation of enhanced MD5 algorithm using SSL to ensure data integrity. In Proceedings of the 3rd international conference on machine learning and soft computing (pp. 71–75). Association for Computing Machinery.
  • Diao, C., Zhang, D., Liang, W., Li, K. C., Hong, Y., & Gaudiot, J. L. (2023). A novel spatial-temporal multi-scale alignment graph neural network security model for vehicles prediction. IEEE Transactions on Intelligent Transportation Systems, 24(1), 904–914. https://doi.org/10.1109/TITS.2022.3140229
  • Enabling Linux in Safety Applications (ELISA) (2020). [Web Page]. Available: https://elisa.tech/. Retrieved from https://elisa.tech/ ([Online]).
  • Fedullo, T., Morato, A., Tramarin, F., Cattini, S., & Rovati, L. (2022). Artificial intelligence-based measurement systems for automotive: A comprehensive review. In 2022 IEEE international workshop on metrology for automotive (metroautomotive) (pp. 122–127). IEEE.
  • Fowler, D. (2022). IEC 61508 viewpoint on system safety in the transport sector: part 1–An overview of IEC 61508. Safety-Critical Systems EJournal, 1(2.
  • Gravani, S., Hedayati, M., Criswell, J., & Scott, M. L. (2021). Fast intra-kernel isolation and security with iskios. In Proceedings of the 24th international symposium on research in attacks, intrusions and defenses (pp. 119–134). Association for Computing Machinery.
  • Hernandez, C., Flieh, J., Paredes, R., Lefebvre, C. A., Allende, I., Abella, J., Trillin, D., Matschnig, M., Fischer, B., Schwarz, K., & Kiszka, J. (2020). Selene: Self-monitored dependable platform for high-performance safety-critical systems. In 2020 23rd euromicro conference on digital system design (DSD) (pp. 370–377). IEEE.
  • Jenn, E., Albore, A., Mamalet, F., Flandin, G., Gabreau, C., Delseny, H., Gauffriau, A., Bonnin, H., Alecu, L., Pirard, J., & Lefevre, B. (2020). Identifying challenges to the certification of machine learning for safety critical systems. In European congress on embedded real time systems (ERTS 2020).
  • Lenstra, A., Wang, X., & de Weger, B. (2005). Colliding x.509 certificates. Cryptology ePrint Archive, Paper 2005/067. Retrieved from https://eprint.iacr.org/2005/067.
  • Li, N., Deng, R., Zhang, Y., & Zhou, H. (2019). Design discussion and performance research of the third-level cache in a multi-socket, Multi-core Microchip. In Computer engineering and technology: 23rd ccf conference, nccet 2019, enshi, China, August 1–2, 2019, revised selected papers 23 (pp. 112–121). Singapore: Springer.
  • Li, Y., & Huang, Z (2022). Basics and Applications of AI in ADAS and Autonomous Vehicles. In Y. Li & H. Shi (Eds.), Advanced driver assistance systems and autonomous vehicles: From fundamentals to applications (pp. 17–48). Singapore: Springer Nature.
  • Manimuthu, A., Venkatesh, V. G., Shi, Y., Sreedharan, V. R., & Koh, S. C. L. (2022). Design and development of automobile assembly model using federated artificial intelligence with smart contract. International Journal of Production Research, 60(1), 111–135. https://doi.org/10.1080/00207543.2021.1988750
  • Mc Guire, N., Okech, P., & Schiesser, G. (2009). Analysis of inherent randomness of the Linux kernel. In Proc. 11th real-time Linux workshop.
  • McVoy, L., & Staelin, C. (1996). Lmbench: Portable tools for performance analysis. In Proceedings of the 1996 annual conference on usenix annual technical conference (p. 23). USENIX Association.
  • Nidamanuri, J., Nibhanupudi, C., Assfalg, R., & Venkataraman, H. (2021). A progressive review: Emerging technologies for ADAS driven solutions. IEEE Transactions on Intelligent Vehicles, 7(2), 326–341. https://doi.org/10.1109/TIV.2021.3122898
  • Novak, T., & Gerstinger, A. (2010). Safety- and security-critical services in building automation and control systems. IEEE Transactions on Industrial Electronics, 57(11), 3614–3621. https://doi.org/10.1109/TIE.2009.2028364
  • Okech, P., Guire, N. M., & Okelo-Odongo, W. (2015). Inherent diversity in replicated architectures. arXiv preprint arXiv:1510.02086.
  • Okech, P., Mc Guire, N., & Fetzer, C. (2014). Utilizing inherent diversity in complex software systems. In Proc. of the australian system safety conference (assc2014). Australian Computer Society, Inc.
  • Okech, P., Mc Guire, N., Fetzer, C., & Okelo-Odongo, W. (2013). Investigating execution path non-determinism in the Linux kernel. In Proc. 14th real-time Linux workshop, lugano. osadl.
  • Open Source Automation Development Lab contributors (2019, February). SIL2LinuxMP: OSADL -- open source automation development lab eG [Web page]. Available: http://www.osadl.org/SIL2LinuxMP.sil2-linux-project.0.html. [Online].
  • Platschek, A., Mc Guire, N., & Bulwahn, L. (2018). Certifying Linux: Lessons learned in three years of SIL2LinuxMP.
  • Preisner, T. (2019). Efficient one-shot function tracing in the Linux kernel.
  • Procopio, G. (2020). Safety and security in GNU/Linux real time operating system domain. In Proceedings of 6th international conference in software engineering for defence applications: Seda 2018 6 (pp. 245–254). Springer International Publishing.
  • Reghenzani, F., Massari, G., & Fornaciari, W. (2019, February). The real-time linux kernel: A survey on PREEMPT_RT. ACM Computing Surveys, 52(1), 1–36. https://doi.org/10.1145/3297714
  • Rivest, R. L. (1992). The MD5 message-digest algorithm, internet request for comments. Internet Request for Comments (RFC) 1321.
  • Rostedt, S. (2009a, December). Debugging the kernel using ftrace -- part 1. https://lwn.net/Articles/365835/.
  • Rostedt, S. (2009b). Debugging the kernel using ftrace -- part 2. https://lwn.net/Articles/366796/.
  • Rostedt, S. (2010). Ftrace Linux kernel tracing. In Linux conference Japan.
  • Saddik, A., Latif, R., Ouardi, A. E., Elhoseny, M., & Khelifi, A. (2022). Computer development based embedded systems in precision agriculture: tools and application. Acta Agriculturae Scandinavica, Section B–Soil & Plant Science, 72(1), 589–611. https://doi.org/10.1080/09064710.2021.2024874
  • Sandeep, K., & Abdulhayan, S. (2020). Implementation of data integrity using MD5 and MD2 algorithms in ioT devices. PalArch's Journal of Archaeology of Egypt/Egyptology, 17(7), 7388–7395.
  • Smith, D. J., & Simpson, K. G. (2020). The safety critical systems handbook: A straightforward guide to functional safety: Iec 61508 (2010 edition), iec 61511 (2015 edition) and related guidance. Butterworth-Heinemann.
  • Tao, H., Chen, Y., & Wu, H. (2022). Theoretical and empirical validation of software trustworthiness measure based on the decomposition of attributes. Connection Science, 34(1), 1181–1200. https://doi.org/10.1080/09540091.2022.2061424
  • Tenex load averages for July 1973 (No. 546) (1973, August). RFC 546. RFC Editor. Retrieved https://rfc-editor.org/rfc/rfc546.txt.
  • Vágó, R. (2022). Development of a safe architecture for embedded systems using Linux and Zephyr RTOS.
  • Wirzenius, L., Oja, J., Stafford, S., & Weeks, A. (2005). The Linux system administrator's guide [Web page]. Available: https://tldp.org/LDP/sag/html/filesystems.html.
  • Yong, B., Wei, W., Li, K. C., Shen, J., Zhou, Q., Wozniak, M., Polap, D., & Damaševičius, R. (2022). Ensemble machine learning approaches for webshell detection in internet of things environments. Transactions on Emerging Telecommunications Technologies, 33(6), e4085. https://doi.org/10.1002/ett.v33.6
  • Zhang, Y. (2008). Hackbench. https://people.redhat.com/mingo/cfs-scheduler/tools/hackbenc.
  • Zhang, Y., Yu, J., Chen, Y., Yang, W., Zhang, W., & He, Y. (2022). Real-time strawberry detection using deep neural networks on embedded system (rtsd-net): An edge AI application. Computers and Electronics in Agriculture, 192, Article 106586. ISSN 0168-1699.  https://doi.org/10.1016/j.compag.2021.106586
  • Zhou, R., Zhi, P., Xu, X., Liu, Z., Li, X., & Zhou, Q. (2022). Artificial intelligence in engineering education in the case of self-driving vehicle curriculum. In 2022 IEEE 25th international conference on intelligent transportation systems (ITSC) (pp. 341–348). IEEE Press.