Previous RTAS:
  • 2001
  • 2002
  • 2003
  • 2004
  • 2005

    RTSS, ECRTS
    the IEEE TC on RTS


    since Dec 2004


    This site is sponsored by the Computer Science Department at the University of Pittsburgh.

     

     


    Send your comments and questions to  mosse@cs.pitt.edu

     

     

     

     

     

     

  •   
    IEEE Logo
      Computer Logo

    RTAS 2006 Workshops and Tutorials

    IEEE Real-Time and Embedded Technology and Applications Symposium

    April 4
    Fairmont Hotel
    San Jose, California, United States

    Home Page

    Workshops
  • Innovative Techniques for Certification of Embedded Systems
  • Research Directions for Security and Networking in Critical Real-Time and Embedded Systems
  • Tutorials
  • Frameworks for System-Level Analysis of Real-Time Systems - Symta/S and MPA
  • Intrusion Tolerance: The Road to Security and Dependability in Real-Time and Embedded Systems

  • Workshops
    Innovative Techniques for Certification of Embedded Systems
  • Organizers
    John Hatcliff Kansas State University
    Insup lee University of Pennsylvania
    Oleg Sokolsky University of Pennsylvania
  • Schedule of Events
    8:30 - 10:00 Invited Talk: John Rushby (SRI) & Technical Presentations
    10:30 - 12:30 Technical Presentations
    2:00 - 3:30 Invited Talk: Matt Wilding (Rockwell Collins) & Technical Presentations
    4:00 - 6:00 Technical Presentations & Discussion
  • Rationale

    The use of embedded software in safety and mission-critical systems is increasing rapidly. In addition to well-known domains such as avionics, a variety of integrated systems rely on complex embedded software are being envisioned in health care, the automotive industry, and others.

    The following are characteristics that make emerging and envisioned safety-critical dificult or impossible to certify using conventional certification methods:

  • scale
  • plug & play and collaborative networked systems
  • rapid technology refresh
  • integration of COTS components
  • information-centric systems
  • The goal of this workshop is to bring together participants form academia, industry, standards bodies, and regulatory agencies, including designers with first-hand knowledge of the needs and realities of the certification process, to present innovative strategies and techniques for meeting the challenges above.

    We hope that workshop discussions will bring out modern design methodologies that can supply quantifiable evidence of the product quality and explore their use in the certification process.

  • Topics of Interest

  • evidenced-based (as opposed to process-based) approaches to certification
  • evidence for behavioral and timing properties
  • strategies for using software certification and proof-carry code in the context of certification
  • techniques for security certificationin the context of standards such as Common Criteria and Multiple Independent Levels of Security (MILS)
  • tools for certification and certification of tools
  • quality measures for embedded systems
  • artifacts of embedded system design that can be used as evidence of quality
  • incremental certification and reducing costs of re-certification
  • use of model-driven development and software product-lines in the context of certified systems
  • definitions and tool support for safety-critical language subsets
  • Research Directions for Security and Networking in Critical Real-Time and Embedded Systems (*.PDF,*.TXT)
  • Organizers
    Frank Mueller North Carolina State University
    Peng Ning North Carolina State University
    Kevin Jeffay UNC Chapel Hill
  • Keynotes
    Steve Bellovin Columbia University
    MORE TBA
  • Overview

    The objective of this workshop is to identify research problems related to security and networking of real-time/ embedded systems deployed as control systems for critical infrastructure and as mission-critical systems.

    Scientific principles, disciplined engineering methodologies, and well-defined formulations on system problems have helped the IT industry to produce some of the most celebrated technologies in the past two decades. As we see various technologies penetrate into every aspect of our daily life, new issues and ever greater challenges begin to emerge. Cybersecurity and networking are on top of the list of grand technology challenges that will have profound impact on the quality of information services to be delivered to the whole society. In particular, embedded systems and real-time systems are widely used in today's society. Critical infrastructure, such as the power grid, power plants, telephone and the Internet itself, rely on such systems, just as safety-critical systems (planes, cars) and mission-critical systems (e.g., UAVs) do. Such control systems are increasingly being connected to the Internet to facilitate maintenance and reduce the cost of monitoring. Another trend is to increasingly rely on sensor networks to provide input to these control systems via wireless communication. However, the increasing connectivity of these real-time/embedded systems to general computing services poses a significant threat as they become exposed to potentially harmful attacks. Cybersecurity and networking concerns must be considered to counter these risks.

    This workshop aims to identify these risks at a technical level. Its objective is to determine the needs of current and future critical systems and their integration into existing computing infrastructure. The forum's purpose is to bring together researchers, practitioners and partners from funding agencies to identify grand challenges in this domain. Its intent is to initiate medium to long-term projects addressing fundamentally novel approaches instead of short-term, retrofitted solutions. The workshop results will be compiled in a document to support agencies in their task to request funds for research in this area.

  • Problems of Interest (Topics)
    • Security threats to critical real-time and embedded systems, specifically
      • SCADA (supervisory control and data acquisition) systems
      • PCS (process-control systems)
    • New challenges introduced by networking embedded systems
      • Network connectivity of critical infrastructure
      • Wireless data acquisition and sensor networks
      • Real-time computing techniques for network security measures
      • Real-time constraints on security provisions
    • Trustworthiness of real-time embedded systems and networks
  • Submission

    Authors are invited to submit position papers describing grand challenges (not their solutions) and new research directions to crtes06@csc.ncsu.edu. Submissions are restricted to 2 pages. A selection of these submissions will be considered for presentation during the workshop. Electronic submissions are mandatory. Submissions should be e-mailed to one of the workshop organizers. Preferred formats are PDF or PostScript.

  • Important Dates
    Submission Deadline: Feb 24, 2006 at midnight EDT
    Notification: Mar 13, 2006
    Camera-ready: Mar 20, 2006
  • Panelist
    Helen Gill National Science Foundation
    MORE TBA
  • Advisory Committee
    Steve Bellovin Columbia U.
    Cathy Gebotys Waterloo
    Helen Gill NSF
    Al Mok UT Austin
    Daniel Mosse U Pittsburgh
    Adrian Pe CMU
    Radha Poovendran UW
    Raj Rajkumar CMU
    Srivaths Ravi NEC
    Kang Shin Michigan
    Sang Son UVA
    Eugene Spafford Purdue
    John Stankovic UVA
    Janos Sztipanovits Vanderbilt
    Gene Tsudik UC Irvine
    Wayne Wolf Princeton
    More TBA
  • Tutorials
    Frameworks for System-Level Analysis of Real-Time Systems - Symta/S and MPA
  • Organizers
    Rolf Ernst Technical University of Braunschweig
    Marek Jersak Symtavision
    X. Sharon Hu University of Notre Dame
    Lothar Thiele Swiss Federal Institute of Technology Zurich
  • Objective

    System-level timing, performance, and power becomes increasingly intractable as the interactions between system parts introduce complex dynamic behavior that can not be fully overseen by anyone in a design team. It is agreed that appropriate analysis tools are urgently needed. However, today's dynamic design processes require flexible and extensible tool suites that can cope with and be adapted to changed objectives and new requirements. Furthermore, the trend towards IP reuse and black-box integration introduces another type of complexity as it requires clear interfaces and must cope with only partially avaiable information. This tutorial will address recent research on composable and extensible analysis methods, and tools that demonstrate the application in practice. The tutorial is targeted to embedded system architects, component designers, and integrators as well as researchers in these fields.

  • Format
    Module 1 System Level Performance Analysis - SymTA/S Approach Rolf Ernst
    Module 2 Optimization of HW/SW-Architectures in the Automotive Domain Marek Jersak
    Module 3 Using Sensitivity-Analysis and Dynamic Voltage Scalign for Power and Energy Management X. Sharon Hu
    Module 4 Composable Analysis for Real-Time Systems Lothar Thiele

  • Intrusion Tolerance: The Road to Security and Dependability in Real-Time and Embedded Systems
  • Organizer
    Paulo Verissimo University of Lisboa Faculty of Sciences
  • Objective

    The purpose of this tutorial is to create awareness, in R/T minded audience, about the extremely important problem of security, and to expose it to new concepts and design principles that help solve it.

  • Format
  • Introduction to the problem of Security & Dependability in Real-Time and Embedded Systems
  • Introduction of fault tolerance and dependability concepts
  • Introduction to security and information assurance concepts
  • Main Intrusion Tolerance (Int/Tol) concepts and terminology
  • The attack-vulnerability-intrusion composite fault model
  • Fail-controlled vs fail-arbitrary models in face of intrustions
  • Hybrid failure assumptions considered useful
  • The problem of time and timeliness vs. security attacks
  • Intrusion prevention
  • Intrusion detection
  • Intrusion tolerance
  • Strategies for Int/Tol real-time and embedded system architecture and design
  • Design methodologies for hybrid-failure Int/Tol systems
  • Examples of Int/Tol systems, architectures, and protocols