• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Á¤º¸°úÇÐȸ³í¹®Áö (Journal of KIISE)

Current Result Document : 4 / 6 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) Alarm°ú ISRÀ» °í·ÁÇÑ IoT µð¹ÙÀ̽º Á¦¾î ¼ÒÇÁÆ®¿þ¾îÀÇ API È£Ãâ Á¦¾à»çÇ× °ËÁõ
¿µ¹®Á¦¸ñ(English Title) API-call Constraint Checking Considering Alarms and ISRs for IoT Device Control Software
ÀúÀÚ(Author) ±èµ¿¿ì   ÃÖÀ±ÀÚ   Dongwoo Kim   Yunja Choi  
¿ø¹®¼ö·Ïó(Citation) VOL 45 NO. 12 PP. 1269 ~ 1278 (2018. 12)
Çѱ۳»¿ë
(Korean Abstract)
IoT ¿î¿µÃ¼Á¦´Â API¸¦ »ç¿ë»óÀÇ ±ÔÄ¢°ú ÇÔ²² Á¦°øÇÏ¸ç »ç¿ë»óÀÇ ±ÔÄ¢ÀÌ À§¹ÝµÉ °æ¿ì ½Ã½ºÅÛÀÇ ¹«°á¼ºÀÌ ±úÁú ¼ö ÀÖ°í ÃÖ¾ÇÀÇ »óȲÀÎ ½Ã½ºÅÛ ½ÇÆбîÁö ¹ß»ýÇÒ ¼ö ÀÖÀ¸¹Ç·Î ¾îÇø®ÄÉÀ̼ÇÀº ¹Ýµå½Ã Á¦¾à»çÇ×À» ÁؼöÇÏ¿© API¸¦ »ç¿ëÇØ¾ß ÇÑ´Ù. ±âÁ¸ ¿¬±¸¿¡¼­´Â ¿î¿µÃ¼Á¦¿Í ¾îÇø®ÄÉÀ̼ÇÀ» Á¤Çü ¸ðµ¨·Î Ç¥ÇöÇÏ°í ¸ðµ¨ °ËÁõÀ» ÅëÇÏ¿© Á¦¾à»çÇ× À§¹Ý ½Ã³ª¸®¿À¸¦ ŽÁöÇÏ¿´Áö¸¸ ½Ã°£À» °í·ÁÇؾßÇÏ´Â AlarmÀ̳ª ÀÓÀÇ·Î ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀÎÅÍ·´Æ® ¹× ISRÀº °ËÁõ ´ë»ó¿¡¼­ Á¦¿ÜµÇ¾î ¿ÀŽ ¹× ¹ÌŽÀÌ ¹ß»ýÇÒ ¼ö ÀÖ´Â ¿©Áö°¡ÀÖ¾ú´Ù. º» ¿¬±¸¿¡¼­´Â AlarmÀÇ ½ÇÁ¦ ½Ã°£Àº Á¤Çü ¸ðµ¨ÀÇ »ó´ë½Ã°£À¸·Î º¯È¯ÇÏ°í ÀÎÅÍ·´Æ®¿Í ISRÀº °ËÁõ¸ðµ¨¿¡¼­ ÀÓÀÇ·Î ¹ß»ýÇϵµ·Ï Á¤ÀÇÇÔÀ¸·Î½á Alarm ¹× ISRÀ» °í·ÁÇÑ Á¦¾à»çÇ× °ËÁõÀ» °¡´ÉÇÏ°Ô ÇÏ¿´´Ù. Á¦¾ÈÇÑ ¹æ¹ýÀ» 19°³ IoT ¾îÇø®ÄÉÀ̼ǿ¡ Àû¿ëÇÑ °á°ú 34°³ÀÇ Á¦¾à»çÇ× À§¹ÝÀ» ŽÁöÇÏ¿´À¸¸ç 15°³´Â Alarm À̳ª ISRÀ» °í·ÁÇÏÁö ¾Ê¾ÒÀ» ¶§ ŽÁöÇÒ ¼ö ¾ø´Â Á¦¾à»çÇ× À§¹ÝÀ̾ú´Ù.
¿µ¹®³»¿ë
(English Abstract)
The IoT operating system provides a set of API functions for applications along with a set of API-call constraints and all the applications are required to use API in accordance with these constraints. Improper use of API can result in breaking of system integrity and system failure. The prior study introduced a method for API-call constraint checking by converting the operating system and application into formal models and identifying API-call constraint violation scenarios through model checking. But, Alarms that should be considered for actual time or interrupts that can occur arbitrarily were left out of the scope of the verification. This study introduces the method for verifying API-call constraints considering the Alarms and ISRs. The actual time of an alarm is converted to the relative time of the formal model, and interrupts are defined to be generated anytime to activate an ISR in the verification model. Application of the verification method to 19 IoT applications led to the detection of a total of 34 API-call constraint violations, 15 of which were not detected due to lack of consideration of Alarms and/or ISRs.
Å°¿öµå(Keyword) API   API È£Ãâ Á¦¾à»çÇ× °ËÁõ   Á¤Çü °ËÁõ   IoT system   API   API-call constraint checking   formal verification   IoT system  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå