EMSOFT 2022: 22nd International Conference on Embedded Software
Memory and Compilers
iNVMFS: An Efficient File System for NVRAM-Based Intermittent Computing Devices
Mercury: Instruction Pipeline Aware Code Generation for Simulink Models
An I/O Virtualization Framework With I/O-Related Memory Contention Control for Real-Time Systems
Toward Register Spilling Security Using LLVM and ARM Pointer Authentication
Safety and Security
Safety Analysis of Embedded Controllers Under Implementation Platform Timing Uncertainties
Verified Train Controllers for the Federal Railroad Administration Train Kinematics Model: Balancing Competing Brake and Track Forces
Verifying Controllers With Vision-Based Perception Using Safe Approximate Abstractions
NASA: NVM-Assisted Secure Deletion for Flash Memory
Machine Learning, Networks, and IoT
Adaptive Edge Offloading for Image Classification Under Rate Limit
Online Rerouting and Rescheduling of Time-Triggered Flows for Fault Tolerance in Time-Sensitive Networking
NExG: Provable and Guided State-Space Exploration of Neural Network Control Systems Using Sensitivity Approximation
Tinkertoy: Build Your Own Operating Systems for IoT Devices
Theory and Security
Online Reset for Signal Temporal Logic Monitoring
Vulnerability Detection of ICS Protocols Via Cross-State Fuzzing
Characterising the Effect of Deadline Misses on Time-Triggered Task Chains
MIDAS: Safeguarding IoT Devices Against Malware via Real-Time Behavior Auditing
Energy and Efficiency
DynLiB: Maximizing Energy Availability of Hybrid Li-ion Battery Systems
Stochastic Guarantees for Adaptive Energy Harvesting Systems
Throughput Maximization in Wireless Communication Systems Powered by Hybrid Energy Harvesting
Power, Energy, and Analysis
CapOS: Capacitor Error Resilience for Energy Harvesting Systems
Cyber-Physical Verification of Intermittently Powered Embedded Systems
Sparsity-Aware Intelligent Spatiotemporal Data Sensing for Energy Harvesting IoT System
Verification and Machine Learning
An MILP Encoding for Efficient Verification of Quantized Deep Neural Networks
Efficient Complete Verification of Neural Networks via Layerwised Splitting and Refinement
Tardis: Coverage-Guided Embedded Operating System Fuzzing
Formal Verification of Resource Synchronization Protocol Implementations: A Case Study in RTEMS
Theory and Control
Differentiable Inference of Temporal Logic Formulas
Efficient Backward Reachability Using the Minkowski Difference of Constrained Zonotopes
Towards Minimum WCRT Bound for DAG Tasks Under Prioritized List Scheduling Algorithms
Response-Time Analysis of Limited-Preemptive Sporadic DAG Tasks