Mining Task Precedence Graphs from Real-Time Embedded System Traces

被引:6
作者
Iegorov, Oleg [1 ]
Fischmeister, Sebastian [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
来源
24TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS 2018) | 2018年
关键词
SOFTWARE; MODELS;
D O I
10.1109/RTAS.2018.00033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time embedded systems have evolved from simple, self-contained single-processor computers to distributed multiprocessor systems that are extremely hard to develop and maintain. Execution tracing has proved itself to be a useful technology to gain a detailed knowledge of runtime behavior of software systems. However, the size and complexity of execution traces generated by modern embedded systems make manual trace analysis impossible. Therefore, software developers need tools to extract high-level system models from raw trace data. In this paper, we address the problem of mining task precedence graphs (TPG) from embedded system traces. A TPG can be helpful in performing several crucial software development and maintenance activities: understanding legacy systems, finding runtime bugs, and detect and diagnose anomalies in running systems. We rely on the recurrent nature of real-time systems to solve the TPG mining problem. We propose algorithms to train a TPG on a set of system traces, as well as an algorithm to detect anomalies in trace streams using a TPG. We evaluate our algorithms on industrial execution traces generated on production cars.
引用
收藏
页码:251 / 260
页数:10
相关论文
共 41 条
  • [31] Qing L., 2003, Real-Time Concepts for Embedded Systems
  • [32] Encoding program executions
    Reiss, SP
    Renieris, M
    [J]. PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2001, : 221 - 230
  • [33] Song HM, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P63, DOI 10.1109/ICOIN.2016.7427089
  • [34] Taylor A., 2017, Ph.D. thesis
  • [35] Taylor A, 2015, 2015 WORLD CONGRESS ON INDUSTRIAL CONTROL SYSTEMS SECURITY (WCICSS), P45, DOI 10.1109/WCICSS.2015.7420322
  • [36] Workflow mining: Discovering process models from event logs
    van der Aalst, W
    Weijters, T
    Maruster, L
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (09) : 1128 - 1142
  • [37] van der Aalst W.., 2016, PROCESS MINING DATA
  • [38] Design and implementation of a rule-based security engine for XML web services
    Vasudevan, Priya
    Yang, Lan
    [J]. FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS, PROCEEDINGS, 2006, : 289 - +
  • [39] A THEOREM ON BOOLEAN MATRICES
    WARSHALL, S
    [J]. JOURNAL OF THE ACM, 1962, 9 (01) : 11 - &
  • [40] Weijters AJMM, 2003, INTEGR COMPUT-AID E, V10, P151