Abstract
The new millennium heralds the convergence between computing, communication and the intelligent control of our physical environments. Computers embedded in roads, bridges, buildings and vehicles tend to have a long life cycle. Application needs will change and computing, communication and control technologies willevolve rapidly. To keep systems modern, we need technologies to dependably and securely upgrade embedded software in the field. This paper provides a review of our work on how to upgrade embedded control systems without shutting them down, and how to protect the system from bugs and attacks that could be introduced by software upgrades.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lim, S., Lee, K., and Sha, L., “Ensuring Integrity and Service Availability in a Web Based Control Laboratory,” Journal of Parallel and Distributed System, Special Issue on Security in Mission Critical Real-time Systems, Accepted for publications.
Software Fault Tolerance, edited by Michael Lyu, John Willey & Sons, 1999.
Mareczek, J., Buss, M., and Spong, M.W., “Invariance Control for a Class of Cascade Nonlinear Systems,” IEEE Trans. Automatic Control, to appear.
Mareczek, J., Buss, M., and Spong, M.W., “Invariance Control for Non-Cascade Nonlinear Systems,“ 2001 American Control Conference, Arlington, VA, May 2001.
Sha, L., “Using Simplicity to Control Complexity,” IEEE Software, July/August, 2001.
Sha L., Rajkumar, R., Sathaye, S., “Generalized Rate Monotonic Scheduling Theory: A Framework for Developing Real-Time Systems”, Proceedings of the IEEE, Vol. 82 No. 1, pp. 68–82, January 1994. (Invited paper)
Sha, L., “Dependable System Upgrades”, Proceedings of IEEE Real Time System Symposium, 1998.
Spong, M.W., “Communication Delay and Control in Telerobotics,” Journal of the Japan Robotics
Rajkumar, R., Gagliardi, M., Sha, L., “The Real-Time Publisher/Subscriber Inter-Process Communication Model for Distributed Real-Time Systems: Design and Implementation”, Proceedings of the First IEEE Real-time Technology and Applications Symposium, pp. 66–75, May 1995.
Cliff Mercer, Ragunathan Rajkumar, and Jim Zelenka, “Temporal Protection in Real-Time Operating Systems”. In Proceedings of the 11th IEEE Workshop on Real-Time Operating Systems and Software, May 1994.
Boyd, S., Ghaoul, L. E., Feron, E., and Balakrishnan, V., “Linear Matrix Inequality in Systems and Control Theory”, SIAM Studies in Applied Mathematics. 1994.
Leveson, N. G., “Safeware: System Safety and Computers”, Addison Wesley, Sept. 1994.
Yeh, Y. C. (Bob), “Dependability of the 777 Primary Flight Control System”, the Proceedings of DCCA Conference, 1995.
Hashii, B., Lal, M., Pandey, R., and Samorodin, S., “Securing Systems Against External Programs,” IEEE Internet Computing, 2(6):35–45, Nov–Dec 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sha, L. (2002). Upgrading Embedded Software in the Field: Dependability and Survivability. In: Sangiovanni-Vincentelli, A., Sifakis, J. (eds) Embedded Software. EMSOFT 2002. Lecture Notes in Computer Science, vol 2491. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45828-X_13
Download citation
DOI: https://doi.org/10.1007/3-540-45828-X_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44307-0
Online ISBN: 978-3-540-45828-9
eBook Packages: Springer Book Archive