A survey and evaluation of android-based malware evasion techniques and detection frameworks
Android platform security is an active area of research where malware detection techniques
continuously evolve to identify novel malware and improve the timely and accurate detection …
continuously evolve to identify novel malware and improve the timely and accurate detection …
[图书][B] Embedded system design: embedded systems foundations of cyber-physical systems, and the internet of things
P Marwedel - 2021 - library.oapen.org
A unique feature of this open access textbook is to provide a comprehensive introduction to
the fundamental knowledge in embedded systems, with applications in cyber-physical …
the fundamental knowledge in embedded systems, with applications in cyber-physical …
[图书][B] Eingebettete Systeme: Grundlagen Eingebetteter Systeme in Cyber-Physikalischen Systemen
P Marwedel - 2021 - library.oapen.org
Abstract Ein Alleinstellungsmerkmal dieses Open-Access-Lehrbuchs ist die umfassende
Einführung in das Grundlagenwissen über eingebettete Systeme mit Anwendungen in cyber …
Einführung in das Grundlagenwissen über eingebettete Systeme mit Anwendungen in cyber …
Cycle-accurate performance modelling in an ultra-fast just-in-time dynamic binary translation instruction set simulator
Instruction set simulators (ISS) are vital tools for compiler and processor architecture design
space exploration and verification. State-of-the-art simulators using just-in-time (JIT) …
space exploration and verification. State-of-the-art simulators using just-in-time (JIT) …
Early execution time-estimation through automatically generated timing models
P Altenbernd, J Gustafsson, B Lisper, F Stappert - Real-Time Systems, 2016 - Springer
Traditional timing analysis, such as worst-case execution time analysis, is normally applied
only in the late stages of embedded system software development, when the hardware is …
only in the late stages of embedded system software development, when the hardware is …
A dynamic scheduling strategy for the chare-kernel system
One of the challenges in programming distributed memory parallel machines is deciding
how to allocate work to processors. This problem is particularly acute for computations with …
how to allocate work to processors. This problem is particularly acute for computations with …
Rethinking anti-emulation techniques for large-scale software deployment
From the security perspective, emulation is often utilized to analyze unknown malware
owing to its capability of tracing fine-grained runtime behavior (ie, execution path …
owing to its capability of tracing fine-grained runtime behavior (ie, execution path …
Performance and power profiling for emulated android systems
CH Tu, HH Hsu, JH Chen, CH Chen… - ACM Transactions on …, 2014 - dl.acm.org
Simulation is a common approach for assisting system design and optimization. For system-
wide optimization, energy and computational resources are often the two most critical …
wide optimization, energy and computational resources are often the two most critical …
Approximate worst-case execution time analysis for early stage embedded systems development
J Gustafsson, P Altenbernd, A Ermedahl… - Software Technologies for …, 2009 - Springer
Abstract A Worst-Case Execution Time (WCET) analysis finds upper bounds for the
execution time of programs. Reliable WCET estimates are essential in the development of …
execution time of programs. Reliable WCET estimates are essential in the development of …
Early performance estimation of embedded software on risc-v processor using linear regression
W Zhang, M Goli, R Drechsler - 2022 25th International …, 2022 - ieeexplore.ieee.org
RISC-V-based embedded systems are becoming more and more popular in recent years.
Performance estimation of embedded software at an early stage of the design process plays …
Performance estimation of embedded software at an early stage of the design process plays …