Welcome to the IKCEST
Journal
IEEE Design & Test

IEEE Design & Test

Archives Papers: 281
IEEE Xplore
Please choose volume & issue:
Product Health Insights Using Telemetry
Fei SuRobert KwasnickJohn HolmWilliam PennerHermann GartlerJosh BoelterYufei ZhouBijan ArbabMichael Rothberg
Keywords:TelemetryComputer bugsSoftwareMonitoringMeasurement uncertaintyCodesTemperature measurementEnd-usersError DetectionSoftware QualityOccurrence Of ErrorsSystematic And Random ErrorsKarlsruhe Institute Of TechnologyLogistic Regression ModelMaximum Likelihood EstimationLow UseInput VariablesProbability Of EventsVolcano PlotEffect Of ErrorTarget VariableDomain ExpertsTime StampTelemetry DataLogistic Regression CoefficientsWindows Operating SystemTelemetryProduct Health Monitoring and ManagementPC errorsLogistic Regression
Abstracts:Editor’s notes: This article explores the use of a chip telemetry infrastructure for continuous monitoring of the health of the hardware system throughout its entire lifetime. This is further extended to provide insights to check bugs in the system. — Mehdi B. Tahoori, Karlsruhe Institute of Technology, Germany
SAFER: Safety Assurances for Emergent Behavior
Caio Batista de MeloMarzieh AshrafiamiriMinjun SeoFadi KurdahiNikil Dutt
Keywords:Behavioral sciencesSafetyRuntimeAnomaly detectionCodesSoftwareMonitoringEmergent BehaviorComplex SystemsSystem StateComputer SystemAutonomous VehiclesPhysical WorldAnomaly DetectionOnline MonitoringCyber-physical SystemsSoftware DefectRecovery SystemModel CheckingBehavior Of Complex SystemsKarlsruhe Institute Of TechnologyLatent VariablesDimensionality ReductionF1 ScoreTransit TimeGlobal StatusSafety PropertiesVariational AutoencoderCheckpointingAnomaly Detection MethodsPerformance OverheadAverage F1-scoreState MachineNormal BehaviorTransitional ContextLatent SpaceSystem modelingruntime emergent behavior detectionruntime system recovery
Abstracts:Editor’s notes: Complex systems exhibit emergent behavior, often unpredictable from component actions. This article investigates safety assurances for emergent behavior in complex systems, addressing unpredictability by integrating runtime verification and anomaly detection.— Mehdi B. Tahoori, Karlsruhe Institute of Technology, Germany
Fuzzing for Automated SoC Security Verification: Challenges and Solution
Muhammad Monir HossainKimia Zamiri AzarFahim RahmanFarimah FarahmandiMark M. Tehranipoor
Keywords:SecurityFuzzingSolid modelingTestingMicroprogrammingSiliconScalabilitySecurity VerificationScalableInformation LeakageSecurity VulnerabilitiesSoftware TestingEvaluative FeedbackSystem-on-chipFormal VerificationVerification TechniquesKarlsruhe Institute Of TechnologyEncryptionFalse AlarmSecurity LevelModel VerificationDesign TeamThreat ModelIdentity TheftUnified LanguageAbstraction LayerCryptographic Primitives
Abstracts:Editor’s notes: Hardware-oriented fuzzing is an effective approach for the verification of Systems on Chip (SoCs). This article explores the challenges and opportunities of fuzzing for automated security verification of SoCs in their entire lifecycle. — Mehdi B. Tahoori, Karlsruhe Institute of Technology, Germany
Hot Journals