|
Previous RTAS:
2001
2002
2003
2004
2005
RTSS,
ECRTS
the IEEE TC on RTS
since Dec 2004
This site is sponsored by the
Computer Science Department at the
University of Pittsburgh.
Send your comments and questions to
mosse@cs.pitt.edu
| |
|
RTAS 2006 Workshops and Tutorials
IEEE Real-Time and Embedded Technology and Applications Symposium
April 4
Fairmont Hotel
San Jose, California, United States
Home Page
|
|
|
Workshops
|
Innovative Techniques for Certification of Embedded Systems
Organizers
Schedule of Events
|
8:30 - 10:00
|
|
Invited Talk: John Rushby (SRI) & Technical Presentations
|
|
10:30 - 12:30
|
|
Technical Presentations
|
|
2:00 - 3:30
|
|
Invited Talk: Matt Wilding (Rockwell Collins) & Technical Presentations
|
|
4:00 - 6:00
|
|
Technical Presentations & Discussion
|
Rationale
|
The use of embedded software in safety and mission-critical
systems is increasing rapidly. In addition to well-known
domains such as avionics, a variety of integrated systems rely
on complex embedded software are being envisioned in health
care, the automotive industry, and others.
The following are characteristics that make emerging and
envisioned safety-critical dificult or impossible to
certify using conventional certification methods:
scale
plug & play and collaborative networked systems
rapid technology refresh
integration of COTS components
information-centric systems
The goal of this workshop is to bring together participants
form academia, industry, standards bodies, and regulatory
agencies, including designers with first-hand knowledge
of the needs and realities of the certification process,
to present innovative strategies and techniques for meeting
the challenges above.
We hope that workshop discussions will bring out modern
design methodologies that can supply quantifiable
evidence of the product quality and explore their use in
the certification process.
|
Topics of Interest
|
evidenced-based (as opposed to process-based) approaches to certification
evidence for behavioral and timing properties
strategies for using software certification and
proof-carry code in the context of certification
techniques for security certificationin the context
of standards such as Common Criteria and Multiple
Independent Levels of Security (MILS)
tools for certification and certification of tools
quality measures for embedded systems
artifacts of embedded system design that can be used
as evidence of quality
incremental certification and reducing costs of
re-certification
use of model-driven development and software
product-lines in the context of certified systems
definitions and tool support for safety-critical
language subsets
|
|
|
Research Directions for Security and Networking in Critical Real-Time and Embedded Systems
(*.PDF,*.TXT)
Organizers
|
Frank Mueller
|
North Carolina State University
|
|
Peng Ning
|
North Carolina State University
|
|
Kevin Jeffay
|
UNC Chapel Hill
|
Keynotes
|
Steve Bellovin
|
Columbia University
|
|
MORE TBA
|
|
|
|
|
Overview
|
The objective of this workshop is to identify research
problems related to security and networking of real-time/
embedded systems deployed as control systems for critical
infrastructure and as mission-critical systems.
Scientific principles, disciplined engineering methodologies,
and well-defined formulations on system problems have helped
the IT industry to produce some of the most celebrated
technologies in the past two decades. As we see various
technologies penetrate into every aspect of our daily life,
new issues and ever greater challenges begin to emerge.
Cybersecurity and networking are on top of the list of grand
technology challenges that will have profound impact on the
quality of information services to be delivered to the whole
society. In particular, embedded systems and real-time
systems are widely used in today's society. Critical
infrastructure, such as the power grid, power plants,
telephone and the Internet itself, rely on such systems, just
as safety-critical systems (planes, cars) and
mission-critical systems (e.g., UAVs) do. Such control
systems are increasingly being connected to the Internet to
facilitate maintenance and reduce the cost of monitoring.
Another trend is to increasingly rely on sensor networks to
provide input to these control systems via wireless
communication. However, the increasing connectivity of these
real-time/embedded systems to general computing services
poses a significant threat as they become exposed to
potentially harmful attacks. Cybersecurity and networking
concerns must be considered to counter these risks.
This workshop aims to identify these risks at a technical
level. Its objective is to determine the needs of current and
future critical systems and their integration into existing
computing infrastructure. The forum's purpose is to bring
together researchers, practitioners and partners from funding
agencies to identify grand challenges in this domain. Its
intent is to initiate medium to long-term projects addressing
fundamentally novel approaches instead of short-term,
retrofitted solutions. The workshop results will be compiled
in a document to support agencies in their task to request
funds for research in this area.
|
Problems of Interest (Topics)
|
- Security threats to critical real-time and embedded systems, specifically
- SCADA (supervisory control and data acquisition) systems
- PCS (process-control systems)
- New challenges introduced by networking embedded systems
- Network connectivity of critical infrastructure
- Wireless data acquisition and sensor networks
- Real-time computing techniques for network security measures
- Real-time constraints on security provisions
- Trustworthiness of real-time embedded systems and networks
|
Submission
|
Authors are invited to submit position papers describing
grand challenges (not their solutions) and new research
directions to crtes06@csc.ncsu.edu.
Submissions are restricted to 2 pages. A selection of these
submissions will be considered for presentation during the
workshop. Electronic submissions are mandatory. Submissions
should be e-mailed to one of the workshop organizers.
Preferred formats are PDF or PostScript.
|
Important Dates
|
Submission Deadline: Feb 24, 2006 at midnight EDT
|
|
Notification: Mar 13, 2006
|
|
Camera-ready: Mar 20, 2006
|
Panelist
|
Helen Gill
|
National Science Foundation
|
|
MORE TBA
|
|
|
|
|
Advisory Committee
|
Steve Bellovin
|
Columbia U.
|
|
Cathy Gebotys
|
Waterloo
|
|
Helen Gill
|
NSF
|
|
Al Mok
|
UT Austin
|
|
Daniel Mosse
|
U Pittsburgh
|
|
Adrian Pe
|
CMU
|
|
Radha Poovendran
|
UW
|
|
Raj Rajkumar
|
CMU
|
|
Srivaths Ravi
|
NEC
|
|
Kang Shin
|
Michigan
|
|
Sang Son
|
UVA
|
|
Eugene Spafford
|
Purdue
|
|
John Stankovic
|
UVA
|
|
Janos Sztipanovits
|
Vanderbilt
|
|
Gene Tsudik
|
UC Irvine
|
|
Wayne Wolf
|
Princeton
|
|
More TBA
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tutorials
|
Frameworks for System-Level Analysis of Real-Time Systems - Symta/S and MPA
Organizers
Objective
|
System-level timing, performance, and power becomes
increasingly intractable as the interactions between
system parts introduce complex dynamic behavior that
can not be fully overseen by anyone in a design team.
It is agreed that appropriate analysis tools are urgently
needed. However, today's dynamic design processes require
flexible and extensible tool suites that can cope with and
be adapted to changed objectives and new requirements.
Furthermore, the trend towards IP reuse and black-box
integration introduces another type of complexity as it
requires clear interfaces and must cope with only partially
avaiable information. This tutorial will address recent
research on composable and extensible analysis methods,
and tools that demonstrate the application in practice.
The tutorial is targeted to embedded system architects,
component designers, and integrators as well as researchers
in these fields.
|
|
Format
|
Module 1
|
System Level Performance Analysis - SymTA/S Approach
|
Rolf Ernst
|
|
Module 2
|
Optimization of HW/SW-Architectures in the Automotive Domain
|
Marek Jersak
|
|
Module 3
|
Using Sensitivity-Analysis and Dynamic Voltage Scalign for
Power and Energy Management
|
X. Sharon Hu
|
|
Module 4
|
Composable Analysis for Real-Time Systems
|
Lothar Thiele
|
|
|
Intrusion Tolerance: The Road to Security and Dependability in Real-Time and Embedded Systems
Organizer
Objective
|
The purpose of this tutorial is to create awareness, in
R/T minded audience, about the extremely important problem
of security, and to expose it to new concepts and design
principles that help solve it.
|
|
Format
|
Introduction to the problem of Security & Dependability
in Real-Time and Embedded Systems
Introduction of fault tolerance and dependability concepts
Introduction to security and information assurance concepts
Main Intrusion Tolerance (Int/Tol) concepts and terminology
The attack-vulnerability-intrusion composite fault model
Fail-controlled vs fail-arbitrary models in face of intrustions
Hybrid failure assumptions considered useful
The problem of time and timeliness vs. security attacks
Intrusion prevention
Intrusion detection
Intrusion tolerance
Strategies for Int/Tol real-time and embedded system
architecture and design
Design methodologies for hybrid-failure Int/Tol systems
Examples of Int/Tol systems, architectures, and protocols
|
|
|
|
| |