Conference paper Open Access

Safe and secure software updates on high-performance embedded systems

Irune Agirre


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">OTASU</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">safety</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">security</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">autonomous systems</subfield>
  </datafield>
  <controlfield tag="005">20200831125925.0</controlfield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in DSN 2020. https://doi.org/10.1109/DSN-W50199.2020.00021</subfield>
  </datafield>
  <controlfield tag="001">4008919</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">Jun 29, 2020 - Jul 2, 2020</subfield>
    <subfield code="g">DSN 2020</subfield>
    <subfield code="a">Dependable Systems and Networks</subfield>
    <subfield code="c">Valencia, Spain</subfield>
    <subfield code="n">Workshop Dependable Systems and Networks</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">73709</subfield>
    <subfield code="z">md5:6573888088d932354b140bb07ada0b01</subfield>
    <subfield code="u">https://zenodo.org/record/4008919/files/DSN_W_U2D_ExtendedAbstract.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="y">Conference website</subfield>
    <subfield code="u">https://dsn2020.webs.upv.es/</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-08-31</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="p">user-up2date</subfield>
    <subfield code="o">oai:zenodo.org:4008919</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Ikerlan</subfield>
    <subfield code="0">(orcid)0000-0002-9507-8841</subfield>
    <subfield code="a">Irune Agirre</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Safe and secure software updates on high-performance embedded systems</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-up2date</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;The next generation of dependable embedded systems feature autonomy and higher levels of interconnection. Autonomy is commonly achieved with the support of artificial intelligence algorithms that pose high computing demands on the hardware platform, reaching a high performance scale. This involves a dramatic increase in software and hardware complexity, fact that together with the novelty of the technology,raises serious concerns regarding system dependability. Traditional approaches for certification require to demonstrate that the system will be acceptably safe to operate before it is deployed into service. The nature of autonomous systems, with potentially infinite scenarios, configurations and unanticipated interactions, makes it increasingly difficult to support such claim at design time. In this context, the extended networking technologies can be exploited to collect post-deployment&lt;br&gt;
evidence that serve to oversee whether safety assumptions are preserved during operation and to continuously improve the system through regular software updates. These software updates are not only convenient for critical bug fixing but also necessary for keeping the interconnected system resilient against security threats. However, such approach requires a recondition of the traditional certification practices.&lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.1109/DSN-W50199.2020.00021</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
</record>
69
84
views
downloads
Views 69
Downloads 84
Data volume 6.2 MB
Unique views 57
Unique downloads 79

Share

Cite as