Symbolic-Based Monitoring for Embedded Applications

Symbolic-Based Monitoring for Embedded Applications

Pramila Mouttappa, Stephane Maag, Ana Cavalli
Copyright: © 2014 |Pages: 23
ISBN13: 9781466661943|ISBN10: 1466661941|EISBN13: 9781466661950
DOI: 10.4018/978-1-4666-6194-3.ch003
Cite Chapter Cite Chapter

MLA

Mouttappa, Pramila, et al. "Symbolic-Based Monitoring for Embedded Applications." Handbook of Research on Embedded Systems Design, edited by Alessandra Bagnato, et al., IGI Global, 2014, pp. 52-74. https://doi.org/10.4018/978-1-4666-6194-3.ch003

APA

Mouttappa, P., Maag, S., & Cavalli, A. (2014). Symbolic-Based Monitoring for Embedded Applications. In A. Bagnato, L. Indrusiak, I. Quadri, & M. Rossi (Eds.), Handbook of Research on Embedded Systems Design (pp. 52-74). IGI Global. https://doi.org/10.4018/978-1-4666-6194-3.ch003

Chicago

Mouttappa, Pramila, Stephane Maag, and Ana Cavalli. "Symbolic-Based Monitoring for Embedded Applications." In Handbook of Research on Embedded Systems Design, edited by Alessandra Bagnato, et al., 52-74. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-6194-3.ch003

Export Reference

Mendeley
Favorite

Abstract

Testing embedded systems to find errors and to validate that the implemented system as per the specifications and requirements has become an important part of the system design. The research community has proposed several formal approaches these last years, but most of them only consider the control portion of the protocol, neglecting the data portions, or are confronted with an overloaded amount of data values to consider. In this chapter, the authors present a novel approach to model protocol properties of embedded application in terms of Input-Output Symbolic Transition Systems (IOSTS) and show how they can be tested on real execution traces taking into account the data and control portions. These properties can be designed to test the conformance of a protocol as well as security aspects. A parametric trace slicing approach is presented to match trace and property. This chapter is illustrated by an application to a set of real execution traces extracted from a real automotive Bluetooth framework with functional and security properties.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.