Categories

Mobile — 89
NSL — 22
NSL Project — 2

dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel

by Sihyeong Park on 2016-10-17 20:30:38

Date: 2016.11.24(Mon) 10:00 A.M. Locate: EB5. 533 Presenter: Sihyeong Park Title: dOSEK: The Design and Implementation of a Dependability-Oriented Static Embedded Kernel Author: Martin Hoffmann, Florian Lukas, Christian Dietrich, Daniel Lohmann Abstract: Because of shrinking structure sizes and operating voltages, computing hardware exhibits an increasing susceptibility against transient hardware faults: Issues previously only known from avionics systems, such as bit flips caused by cosmic radiation, nowadays also affect automotive and other cost-sensitive “ground-level” control systems. For such cost-sensitive systems, many software-based measures have been suggested to harden applications against transient effects. However, all these measures assume that the underlying operating system works reliably in all cases. We present software-based concepts for constructing an operating system ... Continue reading →

457 Views

An RF doormat for tracking people's room locations

by Jinse Kwon on 2016-10-16 19:41:39

Date : 2016. 10. 16 (Mon) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : An RF doormat for tracking people's room locations Author : Juhi Ranjan,Yu Yao, Kamin Whitehouse (University of Virginia, Charlottesville, VA, USA)   Abstract : Many occupant-oriented smarthome applications such as automated lighting, heating and cooling, and activity recognition need room location information of residents within a building. Surveillance based tracking systems used to track people in commercial buildings, are privacy invasive in homes. In this paper, we present the RF Doormat - a RF threshold system that can accurately track people's room locations by monitoring their movement through the doorways in the home. We also present a set of guidelines and a visualization to easily and rapidly setup the RF-Doormat system on any doorway. To evaluate our system, we perform 580 doorway crossings across 11 different doorways in a home. ... Continue reading →

376 Views

Presentation rehearsal for Smarttention 2016

by Jemin Lee on 2016-08-30 16:26:18

Date : 2016. 08. 31 (Wed) 10:00 A.M. Locate: EB5. 533 Presenter: Jemin Lee Seminar Title: Presentation Rehearsal for Smarttention 2016 I am planning to do a presentation with regard to my work, entitled "Reducing Distraction of Smartwatch Users with Deep Learning" in upcoming workshop. For preperation, the rehearsal will be tomorrow. For more inforamtion, vist http://mhci16.smarttention.com/#program         Continue reading →

383 Views

전달 세미나 : RTCSA 2016

by Seula Hwang on 2016-08-23 20:13:41

Date : 2016. 08. 24 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Seminar Title : Reviews for IWCPS 2016 and RTCSA 2016 Continue reading →

408 Views

Beetle: Flexible Communication for Bluetooth Low Energy

by Jinse Kwon on 2016-08-08 10:39:27

Date : 2016. 08. 10 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : Beetle: Flexible Communication for Bluetooth Low Energy Author : Amit Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein   Abstract : The next generation of computing peripherals will be low power ubiquitous computing devices such as door locks, smart watches, and heart rate monitors. Bluetooth Low Energy is a primary protocol for connecting such peripherals to mobile and gateway devices. Current operating system support for Bluetooth Low Energy forces peripherals into vertical application silos. As a result, simple, intuitive applications such as opening a door with a smart watch or simultaneously logging and viewing heart rate data are impossible. We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without ... Continue reading →

436 Views

Understanding the Characteristics of AndroidWear OS

by Jemin Lee on 2016-08-01 17:29:16

Date : 2016. 08. 03. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee   Title: Understanding the Characteristics of AndroidWear OS Author: Renju Liu and Felix Xiaozhu Lin Abstract  Interactive wearable devices bring dramatic changes to apps and hardware, leaving operating system (OS) design in the mist. To this end, we thoroughly examine the execution efficiency of Android Wear, a popular wearable OS. By running a suite of fifteen bench marks, we profile four system aspects: CPU usage, idle episodes, thread-level parallelism, and microarchitectural behaviors. We present the discovered inefficiencies and their root causes, together with a series of widespread, yet unknown OS design flaws. Towards designing future wearable OSes, our study has yielded a generic lesson, key insights, and specific action items.   Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services ... Continue reading →

442 Views

[Video] Surviving Peripheral Failures in Embedded Systems

by Sihyeong Park on 2016-07-25 19:02:29

Date: 2016. 07. 27. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: Sihyeong Park Title: Surviving Peripheral Failures in Embedded Systems Author: Rebecca Smith and Scott Rixner, Rice University Abstract:  Peripherals fail. Yet, modern embedded systems largely leave the burden of tolerating peripheral failures to the programmer. This paper presents Phoenix, a semi-automated peripheral recovery system for resource-constrained embedded systems. Phoenix introduces lightweight checkpointing mechanisms that transparently track both the internal program state and the external peripheral state. These mechanisms enable rollback to the precise point at which any failed peripheral access occurred using as little as 6 KB of memory, minimizing both recovery latency and memory utilization.   2015 USENIX Annual Technical Conference  https://www.usenix.org/conference/atc15/technical-session/presentation/smith Continue reading →

535 Views

[Video] Drowsy power management

by Jemin Lee on 2016-07-19 17:13:45

Date: 2016. 07. 20. (Wed) 10:00 A.M. Locate:  EB5. 533 Presenter: jemin lee Title: Drowsy power management Author: Matthew Lentz, James Litton, Bobby Bhattacharjee   Abstract:  Portable computing devices have fast multi-core processors, large memories, and many on-board sensors and radio interfaces, but are often limited by their energy consumption. Traditional power management subsystems have been extended for smartphones and other portable devices, with the intention of maximizing the time that the devices are in a low-power "sleep" state. The approaches taken by these subsystems prove inefficient for many short-lived tasks common to portable devices, e.g., querying a sensor or polling a cloud service. We introduce Drowsy, a new power management state that replaces "awake." In the Drowsy state, not all system components are woken up, only the minimal set required for a pending task(s). Drowsy constructs and maintains the minimal task set by ... Continue reading →

428 Views

Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals

by Jinyoung Choi on 2016-07-08 16:33:22

Date : 2016. 07. 13. (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi Title : Comparison of HRV Parameters Derived from Photoplethysmography and Electrocardiography Signals Author : Vala Jeyhani, Shadi Mahdiani, Mikko Peltokangas, Antti Vehkaoja   Abstract : Heart rate variability (HRV) has become a useful tool in analysis of cardiovascular system in both research and clinical fields. HRV has been also used in other applications such as stress level estimation in wearable devices. HRV is normally obtained from ECG as the time interval of two successive R waves. Recently PPG has been proposed as an alternative for ECG in HRV analysis to overcome some difficulties in measurement of ECG. In addition, PPG-HRV is also used in some commercial devices such as modern optical wrist-worn heart rate monitors. However, some  esearches have shown that PPG is not a surrogate for heart rate ... Continue reading →

476 Views

전달 세미나 : ATC 2016

by Wonjun Hwang on 2016-07-05 21:50:07

Date : 2016. 07. 6 (Wed) 10:00 P.M. Locate : EB5. 533 Presenter : Wonjun Hwang Seminar Title : Reviews for ATC 2016   Continue reading →

442 Views

Security Testing Methods and Techniques of Industrial Control Devices

by Sungyup Lee on 2016-06-13 14:00:46

Date : 2016. 07. 06(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Sungyup Lee   Title : Security Testing Methods and Techniques of Industrial Control Devices Author : Wei Zhao, Feng Xie, Yong Peng, Yang Gao, Xuefeng Han, Haihui Gao, Dejin Wang   Abstract : “Stuxnet” event in 2010 causes the intense attention all over the world about information security problems of industrial control systems, how to assure the security of industrial control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of industrial control devices. We first review the existing security certifications in this area and analyze the features of these certifications. Then, we review and describe the existing security standards in this area. Furthermore, we review and compare the testing tools used for security testing of industrial control devices. Following this ... Continue reading →

419 Views

Security Crash Test - Practical Security Evaluations of Automotive Onboard IT Components

by Ikhee Shin on 2016-05-30 15:51:18

Date : 2016. 06. 01(Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Ikhee Shin   Title : Security Crash Test – Practical Security Evaluations of Automotive Onboard IT Components Author : Stephanie Bayer, Thomas Enderle, Dennis Kengo Oka*), Marko Wolf   Abstract : Modern vehicles consist of many interconnected, software-based IT components which are tested very carefully for correct functional behavior to avoid safety problems, e.g. that the brakes suddenly stop working. However, in contrast to safety testing systematic testing against potential security gaps is not yet a common procedure within the automotive domain. This however could eventually enable a malicious entity to be able to attack a safety-critical IT component or even the whole vehicle. Several real-world demonstrations have already shown that this risk is not only academic theory . Facing this challenge, the paper at hand first introduces some potential ... Continue reading →

552 Views

EchoTag: Accurate Infrastructure-Free Indoor Location Tagging with Smartphones

by Seula Hwang on 2016-05-16 17:09:28

Date : 2016. 05. 18 (Wed) 10:00 A.M. Locate : EB5. 533 Presenter : Hwang Seula Title : EchoTag: Accurate Infrastructure-Free Indoor Location Tagging with Smartphones Author : Yu-Chih Tung and Kang G. Shin   Abstract : We propose a novel mobile system, called EchoTag, that enables phones to tag and remember indoor locations without requiring any additional sensors or pre-installed infrastructure. The main idea behind EchoTag is to actively generate acoustic signatures by transmitting a sound signal with a phone's speakers and sensing its reflections with the phone's microphones. This active sensing provides finer-grained control of the collected signatures than the widely-used passive sensing. For example, because the sensing signal is controlled by EchoTag, it can be intentionally chosen to enrich the sensed signatures and remove noises from useless reflections. Extensive experiments show that EchoTag distinguishes 11 tags at 1cm ... Continue reading →

468 Views

PowerSpy: Location Tracking Using Mobile Device Power Analysis

by Jinse Kwon on 2016-05-09 21:40:07

Date : 2016. 05. 11 (Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Jinse Kwon   Title : PowerSpy: Location Tracking Using Mobile Device Power Analysis Author : Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, and Dan Boneh, Stanford University; Gabi Nakibly, National Research and Simulation Center/Rafael Ltd.   Abstract : Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone’s aggregate power consumption over a period of a few minutes an application can learn information about the user’s location. Aggregate phone power consumption data is extremely noisy due to the multitude of components and applications that simultaneously consume power. Nevertheless, by using machine learning algorithms we are able ... Continue reading →

428 Views

Trajectories

by Jinyoung Choi on 2016-04-13 00:00:00

Date : 2016. 05. 04. (Wed) 11:00 A.M. Locate : EB5. 533 Presenter : Jinyoung Choi   Title : Trajectories of Depression: Unobtrusive Monitoring of Depressive States by means of Smartphone Mobility Traces Analysis Author : Luca Canzian, Mirco Musolesi   Abstract :  One of the most interesting applications of mobile sensing is monitoring of individual behavior, especially in the area of mental health care. Most existing systems require an interaction with the device, for example they may require the user to input his/her mood state at regular intervals. In this paper we seek to answer whether mobile phones can be used to unobtrusively monitor individuals affected by depressive mood disorders by analyzing only their mobility patterns from GPS traces. In order to get ground-truth measurements, we have developed a smartphone application that periodically collects the locations of the users and the answers to daily questionnaires that ... Continue reading →

534 Views