Mining Task Precedence Graphs from Real-Time Embedded System Traces

被引:6
作者
Iegorov, Oleg [1 ]
Fischmeister, Sebastian [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
来源
24TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2018) | 2018年
关键词
SOFTWARE; MODELS;
D O I
10.1109/RTAS.2018.00033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time embedded systems have evolved from simple, self-contained single-processor computers to distributed multiprocessor systems that are extremely hard to develop and maintain. Execution tracing has proved itself to be a useful technology to gain a detailed knowledge of runtime behavior of software systems. However, the size and complexity of execution traces generated by modern embedded systems make manual trace analysis impossible. Therefore, software developers need tools to extract high-level system models from raw trace data. In this paper, we address the problem of mining task precedence graphs (TPG) from embedded system traces. A TPG can be helpful in performing several crucial software development and maintenance activities: understanding legacy systems, finding runtime bugs, and detect and diagnose anomalies in running systems. We rely on the recurrent nature of real-time systems to solve the TPG mining problem. We propose algorithms to train a TPG on a set of system traces, as well as an algorithm to detect anomalies in trace streams using a TPG. We evaluate our algorithms on industrial execution traces generated on production cars.
引用
收藏
页码:251 / 260
页数:10
相关论文
共 41 条
  • [1] Agrawal R, 1998, LECT NOTES COMPUT SC, V1377, P469
  • [2] Mining specifications
    Ammons, G
    Bodík, R
    Larus, JR
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (01) : 4 - 16
  • [3] [Anonymous], 2016, P 5 INT WORKSHOP SOF
  • [4] Babcock B., 2002, PODS, P1, DOI [DOI 10.1145/543613.543615, 10.1145/543613.543615]
  • [5] Inferring Models of Concurrent Systems from Logs of Their Behavior with CSight
    Beschastnikh, Ivan
    Brun, Yuriy
    Ernst, Michael D.
    Krishnamurthy, Arvind
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 468 - 479
  • [6] SYNTHESIS OF FINITE-STATE MACHINES FROM SAMPLES OF THEIR BEHAVIOR
    BIERMANN, AW
    FELDMAN, JA
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 1972, C 21 (06) : 592 - &
  • [7] Broy M., 2006, 28th International Conference on Software Engineering Proceedings, P33, DOI 10.1145/1134285.1134292
  • [8] Anomaly Detection for Discrete Sequences: A Survey
    Chandola, Varun
    Banerjee, Arindam
    Kumar, Vipin
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (05) : 823 - 839
  • [9] Every Move You Make
    Charette, Robert N.
    [J]. IEEE SPECTRUM, 2009, 46 (12) : 7 - 7
  • [10] Detecting and localizing wireless spoofing attacks
    Chen, Yingying
    Trappe, Wade
    Martin, Richard P.
    [J]. 2007 4TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD-HOC COMMUNICATIONS AND NETWORKS, VOLS 1 AND 2, 2007, : 193 - +