Experience report: Log mining using natural language processing and application to anomaly detection

C Bertero, M Roy, C Sauvanaud… - 2017 IEEE 28th …, 2017 - ieeexplore.ieee.org
Event logging is a key source of information on a system state. Reading logs provides
insights on its activity, assess its correct state and allows to diagnose problems. However …

Execution trace analysis for a precise understanding of latency violations

M Zoor, L Apvrille, R Pacalet, S Coudert - Software and Systems Modeling, 2023 - Springer
Despite the amount of proposed works for the verification of embedded systems,
understanding the root cause of violations of requirements in simulation or execution traces …

Periodic task mining in embedded system traces

O Iegorov, R Torres… - 2017 IEEE Real-Time and …, 2017 - ieeexplore.ieee.org
Modern systems are growing in complexity beyond deep comprehension of developers.
Increasing difficulties of kee** software projects on schedule and increasing recall rates …

Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis

S Barone, V Casola, S Della Torca… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The spread of computing-systems, especially the realtime embedded ones, is rapidly
growing in the last years, since they find usage in numerous fields of application, including …

Traceviz: A visualization framework for interactive analysis of execution traces

R Dautriche, R Blanch, A Termier… - Actes de la 28ième …, 2016 - dl.acm.org
Hardware platforms of embedded systems are more powerful at each new generation thank
to the integration of System-on-Chip (SoC). Develo** streaming multimedia applications …

[PDF][PDF] Multi-signal anomaly detection for real-time embedded systems

RT Labrada - 2020 - core.ac.uk
This thesis presents MuSADET, an anomaly detection framework targeting timing anomalies
found in event traces from real-time embedded systems. The method leverages stationary …

Software Vulnerabilities Detection Using a Trace-Based Analysis Model

G Koala, D Bassole, T Tiendrebeogo, O Sie - International Conference on …, 2022 - Springer
Over the years, digital technology has grown considerably. With this growth, the information
systems' security has increasingly become a major concern. In this paper, we propose an …

Multi-signal Anomaly Detection for Real-Time Embedded Systems

R Torres Labrada - 2020 - uwspace.uwaterloo.ca
This thesis presents MuSADET, an anomaly detection framework targeting timing anomalies
found in event traces from real-time embedded systems. The method leverages stationary …

Towards A Power Advisor in a Devkit for Internet-of-Things Microcontrollers

V Morice, F Maraninchi, J Cornet - RAPIDO'2020, 2020 - hal.science
Microcontrollers (MCUs) for the Internet-of-Things (IoT) are powerful and versatile computing
platforms, which may be hard to program correctly and efficiently; power performance is …

A High Level Model Based on Hardware Dependencies for The Development of Embedded Software on Microcontrollers

V Morice - 2022 - theses.hal.science
This thesis focuses on the development of embedded software on microcontrollers. The
increasing complexity of these circuits makes the development more challenging. Many …