Categories

Mobile — 71
NSL — 19
NSL Project — 2

[Video] Surviving Peripheral Failures in Embedded Systems

by Sihyeong Park on 2016-07-25 19:02:29

Date: 2016. 07. 27. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: Sihyeong Park Title: Surviving Peripheral Failures in Embedded Systems Author: Rebecca Smith and Scott Rixner, Rice University Abstract:  Peripherals fail. Yet, modern embedded systems largely leave the burden of tolerating peripheral failures to the programmer. This paper presents Phoenix, a semi-automated peripheral recovery system for resource-constrained embedded systems. Phoenix introduces lightweight checkpointing mechanisms that transparently track both the internal program state and the external peripheral state. These mechanisms enable rollback to the precise point at which any failed peripheral access occurred using as little as 6 KB of memory, minimizing both recovery latency and memory utilization.   2015 USENIX Annual Technical Conference  https://www.usenix.org/conference/atc15/technical-session/presentation/smith Continue reading →

378 Views

[Video] Drowsy power management

by Jemin Lee on 2016-07-19 17:13:45

Date: 2016. 07. 20. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee Title: Drowsy power management Author: Matthew Lentz, James Litton, Bobby Bhattacharjee   Abstract:  Portable computing devices have fast multi-core processors, large memories, and many on-board sensors and radio interfaces, but are often limited by their energy consumption. Traditional power management subsystems have been extended for smartphones and other portable devices, with the intention of maximizing the time that the devices are in a low-power "sleep" state. The approaches taken by these subsystems prove inefficient for many short-lived tasks common to portable devices, e.g., querying a sensor or polling a cloud service. We introduce Drowsy, a new power management state that replaces "awake." In the Drowsy state, not all system components are woken up, only the minimal set required for a pending task(s). Drowsy constructs and maintains the minimal task set by ... Continue reading →

313 Views

Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals

by Jinyoung Choi on 2016-07-08 16:33:22

Date : 2016. 07. 13. (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi Title : Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals Author : Vala Jeyhani, Shadi Mahdiani, Mikko Peltokangas, Antti Vehkaoja   Abstract : Heart rate variability (HRV) has become a useful tool in analysis of cardiovascular system in both research and clinical fields. HRV has been also used in other applications such as stress level estimation in wearable devices. HRV is normally obtained from ECG as the time interval of two successive R waves. Recently PPG has been proposed as an alternative for ECG in HRV analysis to overcome some difficulties in measurement of ECG. In addition, PPG-HRV is also used in some commercial devices such as modern optical wrist-worn heart rate monitors. However, some  esearches have shown that PPG is not a surrogate for heart rate ... Continue reading →

341 Views

전달 세미나 : ATC 2016

by Wonjun Hwang on 2016-07-05 21:50:07

Date : 2016. 07. 6 (Wed) 10:00 P.M. Locate : EB5. 533 Presenter : Wonjun Hwang Seminar Title : Reviews for ATC 2016   Continue reading →

307 Views

Security Testing Methods and Techniques of Industrial Control Devices

by Sungyup Lee on 2016-06-13 14:00:46

Date : 2016. 07. 06(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Sungyup Lee   Title : Security Testing Methods and Techniques of Industrial Control Devices Author : Wei Zhao, Feng Xie, Yong Peng, Yang Gao, Xuefeng Han, Haihui Gao, Dejin Wang   Abstract : “Stuxnet” event in 2010 causes the intense attention all over the world about information security problems of industrial control systems, how to assure the security of industrial control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of industrial control devices. We first review the existing security certifications in this area and analyze the features of these certifications. Then, we review and describe the existing security standards in this area. Furthermore, we review and compare the testing tools used for security testing of industrial control devices. Following this ... Continue reading →

317 Views

Security Crash Test - Practical Security Evaluations of Automotive Onboard IT Components

by Ikhee Shin on 2016-05-30 15:51:18

Date : 2016. 06. 01(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin   Title : Security Crash Test – Practical Security Evaluations of Automotive Onboard IT Components Author : Stephanie Bayer, Thomas Enderle, Dennis Kengo Oka*), Marko Wolf   Abstract : Modern vehicles consist of many interconnected, software-based IT components which are tested very carefully for correct functional behavior to avoid safety problems, e.g. that the brakes suddenly stop working. However, in contrast to safety testing systematic testing against potential security gaps is not yet a common procedure within the automotive domain. This however could eventually enable a malicious entity to be able to attack a safety-critical IT component or even the whole vehicle. Several real-world demonstrations have already shown that this risk is not only academic theory . Facing this challenge, the paper at hand first introduces some potential ... Continue reading →

441 Views

EchoTag: Accurate Infrastructure-Free Indoor Location Tagging with Smartphones

by Seula Hwang on 2016-05-16 17:09:28

Date : 2016. 05. 18 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Title : EchoTag: Accurate Infrastructure-Free Indoor Location Tagging with Smartphones Author : Yu-Chih Tung and Kang G. Shin   Abstract : We propose a novel mobile system, called EchoTag, that enables phones to tag and remember indoor locations without requiring any additional sensors or pre-installed infrastructure. The main idea behind EchoTag is to actively generate acoustic signatures by transmitting a sound signal with a phone's speakers and sensing its reflections with the phone's microphones. This active sensing provides finer-grained control of the collected signatures than the widely-used passive sensing. For example, because the sensing signal is controlled by EchoTag, it can be intentionally chosen to enrich the sensed signatures and remove noises from useless reflections. Extensive experiments show that EchoTag distinguishes 11 tags at 1cm ... Continue reading →

359 Views

PowerSpy: Location Tracking Using Mobile Device Power Analysis

by Jinse Kwon on 2016-05-09 21:40:07

Date : 2016. 05. 11 (Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : PowerSpy: Location Tracking Using Mobile Device Power Analysis Author : Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, and Dan Boneh, Stanford University; Gabi Nakibly, National Research and Simulation Center/Rafael Ltd.   Abstract : Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone’s aggregate power consumption over a period of a few minutes an application can learn information about the user’s location. Aggregate phone power consumption data is extremely noisy due to the multitude of components and applications that simultaneously consume power. Nevertheless, by using machine learning algorithms we are able ... Continue reading →

325 Views

Trajectories

by Jinyoung Choi on 2016-04-13 00:00:00

Date : 2016. 05. 04. (Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : Trajectories of Depression: Unobtrusive Monitoring of Depressive States by means of Smartphone Mobility Traces Analysis Author : Luca Canzian, Mirco Musolesi   Abstract :  One of the most interesting applications of mobile sensing is monitoring of individual behavior, especially in the area of mental health care. Most existing systems require an interaction with the device, for example they may require the user to input his/her mood state at regular intervals. In this paper we seek to answer whether mobile phones can be used to unobtrusively monitor individuals affected by depressive mood disorders by analyzing only their mobility patterns from GPS traces. In order to get ground-truth measurements, we have developed a smartphone application that periodically collects the locations of the users and the answers to daily questionnaires that ... Continue reading →

436 Views

RIOT OS: Towards an OS for the Internet of Things

by Sungyup Lee on 2016-04-12 17:43:42

Date : 2016. 04. 13(Wed) 2:00 P.M. Locate : EB5. 533 Presenter : Sungyup Lee   Title : RIOT OS: Towards an OS for the Internet of Things Author : Emmanuel Baccelli and Oliver Hahm, Mesut Gunes and Matthias Wahlisch Freie , Thomas C. Schmidt   Abstract : The Internet of Things (IoT) is characterized by heterogeneous devices. They range from very lightweight sensors powered by 8-bit microcontrollers (MCUs) to devices equipped with more powerful, but energy-efficient 32-bit processors. Neither a traditional operating system (OS) currently running on Internet hosts, nor typical OS for sensor networks are capable to fulfill the diverse requirements of such a wide range of devices. To leverage the IoT, redundant development should be avoided and maintenance costs should be reduced. In this paper we revisit the requirements for an OS in the IoT. We introduce RIOT OS, an OS that explicitly considers devices with minimal resources but ... Continue reading →

354 Views

Ravel: Programming IoT Applications as Distributed Models, Views, and Controllers

by Ikhee Shin on 2016-04-04 13:38:14

Date : 2016. 04. 06(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin   Title : Ravel: Programming IoT Applications as Distributed Models, Views, and Controllers Author : Laurynas Riliskis, James Hong & Philip Levis   Abstract : The embedded sensor networks are a promising technology to improve our life with home and industrial automation, health monitoring, and sensing and actuation in agriculture. Fitness trackers, thermostats, door locks are just a few examples of Internet of Things that have already become part of our everyday life. Despite advances in sensors, microcontrollers, signal processing, networking and programming languages, developing an Internet of Things application is a laborious task. Many of these complex distributed systems share a 3-tier architecture consisting of embedded nodes, gateways that connect an embedded network to the wider Internet and data services in servers or the cloud. Yet the ... Continue reading →

373 Views

Spatial Computing

by Seula Hwang on 2016-03-18 17:54:56

Date : 2016. 03. 30(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Seula Hwang   Title : Spatial Computing Author : Shashi Shekhar, Steven K. Feiner, Walid G. Aref   Abstract : Spatial computing encompasses the ideas, solutions, tools, technologies, and systems that transform our lives by creating a new understanding of locations—how we know, communicate, and visualize our relationship to locations and how we navigate through them. Pervasive GPS allows hikers in national parks, boaters on lakes, children visiting new places, and taxis (or Uber drivers or self-driving cars) and unmanned aerial vehicles to know their locations, nearby facilities, and routes to reach places of interest.   Proceeding : Communications Communications of the ACM, Vol. 59 No. 1, Pages 72-81 10.1145/2756547 Continue reading →

325 Views

dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel

by Sihyeong Park on 2016-03-10 21:30:17

Date: 2016. 03. 16 (Wed) 11:00 A.M. indefinite delay Locate: EB5. 533 Presenter: Sihyeong Park   Title: dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel Author: Martin Hoffmann, Florian Lukas, Christian Dietrich, Daniel Lohmann   Abstract: Because of shrinking structure sizes and operating voltages, computing hardware exhibits an increasing susceptibility against transient hardware faults: Issues previously only known from avionics systems, such as bit flips caused by cosmic radiation, nowadays also affect automotive and other cost-sensitive “ground-level” control systems. For such cost-sensitive systems, many software-based measures have been suggested to harden applications against transient effects. However, all these measures assume that the underlying operating system works reliably in all cases. We present software-based concepts for constructing an ... Continue reading →

460 Views

Monitoring Building Door Events using Barometer Sensor in Smartphones

by Jinse Kwon on 2016-03-04 16:28:02

Date : 2016. 03. 09 (Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : Monitoring Building Door Events using Barometer Sensor in Smartphones Author : Muchen Wu, Parth H. Pathak, Prasant Mohapatra   Abstract : Building security systems are commonly deployed to detect intrusion and burglary in home and business structures. Such systems can accurately detect door open/close events, but their high-cost of installation and maintenance makes them unsuitable for certain building monitoring applications, such as times of high/low entrance traffic, estimating building occupancy, etc. In this paper, we show that barometer sensors found in latest smartphones can directly detect the building door open/close events anywhere inside an insulated building. The sudden pressure change observed by barometers is sufficient to detect events even in presence of user mobility (e.g. climbing stairs). We study various characteristics of ... Continue reading →

350 Views

WearDrive: Fast and Energy-Efficient Storage for Wearables

by Jemin Lee on 2016-02-18 17:05:11

Date : 2016. 02. 29. (Mon.) 03:00 P.M. Locate : EB5. 533 Presenter : Jemin Lee   Title: WearDrive: Fast and Energy-Efficient Storage for Wearables Author: Huang J, Badam A, Chandra R, Nightingale EB   Abstract Size and weight constraints on wearables limit their battery capacity and restrict them from providing rich functionality. The need for durable and secure storage for personal data further compounds this problem as these features incur energy-intensive operations. This paper presents WearDrive, a fast storage system for wearables based on battery-backed RAM and an efficient means to offload energy intensive tasks to the phone. WearDrive leverages low-power network connectivity available on wearables to trade the phone’s battery for the wearable’s by performing large and energy-intensive tasks on the phone while performing small and energy-efficient tasks locally using battery-backed RAM. WearDrive improves the performance of ... Continue reading →

383 Views