, Measure of energy consumption, considering the platform only and both the platform and the application

, Titre: High-level frameworks for the specication and verication of scheduling problems

, Actes: International Journal on Software Tools for Technology Transfer (STTT), pp.1-26, 2017.

, Titre: Information Leakage as a Scheduling Resource. Authors: Fabrizio Biondi, Mounir Chadli, Thomas Given-Wilson, Axel Legay. Actes: International Workshop on Formal Methods for Industrial Critical Systems and Automated Verication of Critical Systems (FMICS-AVoCS), vol.10471, pp.83-99, 2017.

, Titre: A Model-Based Framework for the Specication and Analysis of Hierarchical Scheduling Systems

, Actes: International Workshop on Formal Methods for Industrial Critical Systems and Automated Verication of Critical Systems (FMICS-AVoCS), vol.9933, pp.133-141, 2016.

S. Mário, K. Alvim, C. Chatzikokolakis, G. Palamidessi, and . Smith, Measuring information leakage using generalized gain functions, 2012.

R. Alur and D. L. Dill, A theory of timed automata, Theor. Comput. Sci, vol.126, issue.2, p.183235, 1994.

R. Alur, S. L. Torre, and G. J. Pappas, Optimal paths in weighted timed automata, Theor. Comput. Sci, vol.318, issue.3, p.297322, 2004.

F. Biondi, M. Chadli, T. Given-wilson, and A. Legay, Information leakage as a scheduling resource, FMICS-AVoCS, vol.10471, p.8399, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01382052

A. Benoit, V. Ümit, Y. Çatalyürek, E. Robert, and . Saule, A survey of pipelined workow scheduling: Models and algorithms

. Surv, , vol.45, 2013.

A. Boudjadar, A. David, J. H. Kim, K. G. Larsen, M. Miku£ionis et al., Hierarchical scheduling framework based on compositional analysis using uppaal, Proceedings of the 10th International Symposium on Formal Aspects of Component Software (FACS), Revised Selected Papers, vol.8348, p.6178, 2013.

A. Boudjadar, A. David, J. H. Kim, K. G. Larsen, M. Miku£ionis et al., Degree of schedulability of mixedcriticality real-time systems with probabilistic sporadic tasks, Theoretical Aspects of Software Engineering Conference (TASE), p.126130, 2014.

A. Boudjadar, J. David, K. Kim, M. Larsen, U. Miku£ionis et al., Widening the schedulability of hierarchical scheduling systems, Proceedings of the 11th International Symposium on Formal Aspects of Component Software (FACS), vol.8997, p.209227

. Springer, , 2015.

A. Boudjadar, J. H. David, K. G. Kim, M. Larsen, A. Miku£ionis et al., Linh Phan Xuan, and Ulrik Nyman. Quantitative schedulability analysis of continuous probability tasks in a hierarchical context, 2015.

G. Behrmann, A. David, K. G. Larsen, J. Håkans-son, P. Pettersson et al., UPPAAL 4.0, Third International Conference on the Quantitative Evaluation of Systems (QEST), p.125126, 2006.

G. Behrmann, A. Fehnker, T. Hune, K. G. Larsen, P. Pettersson et al., Minimum-cost reachability for priced timed automata, Proceedings of the 4th International Workshop on Hybrid Systems: Computation and Control (HSCC), p.147161, 2001.

A. Boudjadar, J. H. Kim, A. David, K. G. Larsen, M. Miku£ionis et al., Flexible framework for statistical schedulability analysis o probabilistic sporadic tasks, 18th International Symposium of Real-Time Distributed Computing (ISORC)

M. Backes, B. Köpf, and A. Rybalchenko, Automatic discovery and quantication of information leaks, S&P, p.141153, 2009.

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Theor. Comput. Sci, vol.597, p.6287, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A quantitative security analyzer for imperative code
URL : https://hal.archives-ouvertes.fr/hal-01242615

, LNCS, vol.8044, p.702707, 2013.

K. Sanjoy, A. K. Baruah, L. E. Mok, and . Rosier, Preemptively scheduling hard-real-time sporadic tasks on one processor, Proceedings of the 11th Real-Time Systems Symposium, p.182190, 1990.

M. Basseville and I. V. Nikiforov, Detection of Abrupt Changes: Theory and Application, 1993.
URL : https://hal.archives-ouvertes.fr/hal-00008518

M. Cordovilla, F. Boniol, J. Forget, E. Noulard, and C. Pagetti, Developing critical embedded systems on multicore architectures: the PRELUDE-SCHEDMCORE toolset, p.107116, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00618587

A. Cesta, S. Fratini, A. Orlandini, A. Finzi, and E. Tronci, Flexible plan verication: Feasibility results, Fundam. Inform, vol.107, issue.2-3, p.111137, 2011.

M. Chadli, J. H. Kim, A. Legay, L. Traonouez, S. Naujokat et al., A model-based framework for the specication and analysis of hierarchical scheduling systems, Proceedings of the Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verication of Critical Systems (FMICS-AVoCS), vol.9933, p.133141, 2016.

T. Chothia, Y. Kawamoto, and C. Novakovic, Leakwatch: Estimating information leakage from java programs, LNCS, vol.8713, pp.219-236, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01097603

F. Cassez and K. Larsen, The impressive power of stopwatches, Proceedings of the 11th International Conference on Concurrency Theory (CONCUR), p.138152, 2000.

A. Cimatti, A. Micheli, and M. Roveri, Dynamic controllability of disjunctive temporal networks: Validation and synthesis of executable strategies, Proceedings of the 30th AAAI Conference on Articial Intelligence, p.31163122, 2016.

A. Cimatti, A. Micheli, and M. Roveri, Validating domains and plans for temporal planning via encoding into innite-state linear temporal logic, Proceedings of the 31st AAAI Conference on Articial Intelligence, p.35473554, 2017.

R. Chadha, U. Mathur, and S. Schwoon, Computing information ow using symbolic model-checking

. Suresh, Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, vol.29, p.505516, 2014.

D. +-13]-alexandre-david, K. G. Du, and . Larsen, Axel Legay, and Marius Miku£ionis. Optimizing control strategy using statistical model checking

, NASA Formal Methods: Proceedings of the 5th International Symposium (NFM), p.352367, 2013.

A. David, D. Du, K. G. Larsen, A. Legay, M. Miku£ionis et al., Statistical model checking for stochastic hybrid systems, Proceedings of the First International Workshop on Hybrid Systems and Biology (HSB), vol.92, p.122136, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01088197

A. David, K. G. Larsen, A. Legay, M. Miku£ionis, D. B. Poulsen et al., Statistical model checking for networks of priced timed automata, Proceedings of the 9th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), vol.6919, p.8096, 2011.

A. David, . Kimg, A. Larsen, and . Legay,

D. Bøgsted-poulsen, Uppaal SMC tutorial, International Journal on Software Tools for Technology Transfer, p.119, 2015.

A. David, K. G. Larsen, A. Legay, and M. Miku£io-nis, Schedulability of herschel-planck revisited using statistical model checking, Proceedings of 5th International Symposium ISoLA, Part II, vol.7610, p.293307, 2012.

N. Falliere, L. O. Murchu, and E. Chien, , 2011.

R. L. Graham, Bounds for certain multiprocessing anomalies, The Bell System Technical Journal, vol.45, issue.9, p.15631581, 1966.

R. C. Gronback, Eclipse Modeling Project: A Domain-Specic Language (DSL) Toolkit, 2008.

T. A. Henzinger, The Theory of Hybrid Automata, p.265292

. Springer, , 2000.

S. J�rges, A. Lamprecht, T. Margaria, I. Schaefer, and B. Steen, A Constraint-based Variability Modeling Framework, International Journal on Software Tools for Technology Transfer (STTT), vol.14, issue.5, p.511530, 2012.

. +-15a]-jin-hyun, A. Kim, K. G. Legay, M. Larsen, B. Miku£ionis et al., Resource-parameterized timing analysis of real-time systems, Hardware and Software: Verication and Testing: Proceeding of the 11th

, International Haifa Verication Conference (HVC), p.190205, 2015.

. +-15b]-jin-hyun, A. Kim, K. G. Legay, M. Larsen, B. Miku£ionis et al., Resource-parameterized timing analysis of real-time systems, LNCS, vol.9434, pp.190-205, 2015.

. +-16a]-jin-hyun, A. Kim, L. Legay, A. Traonouez, U. Boudjadar et al., Optimizing the resource requirements of hierarchical scheduling systems, SIGBED Rev, vol.13, issue.3, p.4148, 2016.

. +-16b]-jin-hyun, A. Kim, L. Legay, A. Traonouez, U. Boudjadar et al., Optimizing the resource requirements of hierarchical scheduling systems, SIGBED Review, vol.13, issue.3, p.4148, 2016.

J. Katoen, S. Ivan, E. Zapreev, H. Moritz-hahn, D. Hermanns et al., The ins and outs of the probabilistic model checker mrmc. Performance evaluation, vol.68, p.90104, 2011.

A. Legay, B. Delahaye, and S. Bensalem, Statistical model checking: An overview, Proceedings of the First International Conference on Runtime Verication (RV), vol.6418, p.122135
URL : https://hal.archives-ouvertes.fr/inria-00591593

. Springer, , 2010.

C. L. Liu and J. W. Layland, Scheduling algorithms for multiprogramming in a hard-real-time environment, J. ACM, vol.20, issue.1, p.4661, 1973.

D. Locke, L. Lucas, and J. Goodenough, Generic avionics software specication, 1990.

A. Lamprecht, S. Naujokat, and I. Schaefer, Variability Management Beyond Feature Models, Computer, vol.46, issue.11, p.4854, 2013.

A. Legay and L. Traonouez, Statistical model checking with change detection, Transactions on Foundations for Mastering Change I, vol.1, p.157179, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01242138

D. Maxim and L. Cucu-grosjean, Response Time Analysis for Fixed-Priority Tasks with Multiple Probabilistic Parameters, RTSS 2013 -IEEE Real-Time Systems Symposium, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00918566

S. Manolache, P. Eles, and Z. Peng, Analysis of monoprocessor systems, Real-Time Applications with Stochastic Task Execution Times, p.2760, 2007.

A. Mok, Fundamental design problems of distributed systems for the hard-real-time environment, 1983.

D. C. Montgomery, Design and Analysis of Experiments, 2006.

T. Margaria and B. Steen, Business Process Modelling in the jABC: The One-Thing-Approach, Handbook of Research on Business Process Modeling, 2009.

T. Margaria and B. Steen, Simplicity as a Driver for Agile Innovation, Computer, vol.43, issue.6, p.9092, 2010.

S. Mohan, M. Yoon, R. Pellizzoni, and R. Bobba, Realtime systems security through scheduler constraints, ECRTS, pp.129-140, 2014.

S. Naujokat, M. Lybecait, D. Kopetzki, and B. Steffen, CINCO: A Simplicity-Driven Approach to Full Generation of Domain

, Specic Graphical Modeling Tools. Software Tools for Technology Transfer, 2017.

S. Naujokat, L. Traonouez, M. Isberner, B. Steen, and A. Legay, Domain-Specic Code Generator Modeling: A Case Study for Multi-faceted Concurrent Systems, Proc. of the 6th Int. Symp. on Leveraging Applications of Formal Methods, Verication and Validation, Part I (ISoLA), number 8802 in LNCS, p.463480, 2014.

A. Oddi, R. Rasconi, and A. Cesta, A multi-objective large neighborhood search methodology for scheduling problems with energy costs, 2015.

, IEEE 27th International Conference on Tools with Articial Intelligence (ICTAI), p.453460, 2015.

E. S. Page, Continuous inspection schemes, Biometrika, issue.1/2, p.100115, 1954.

T. X. Linh, J. Phan, A. Lee, V. Easwaran, S. Ramaswamy et al., CARTS: A tool for compositional analysis of real-time systems, SIGBED Rev, vol.8, issue.1, p.6263, 2011.

R. Pellizzoni, N. Paryab, M. Yoon, S. Bak, S. Mohan et al., A generalized model for preventing information leakage in hard real-time systems, 2015.

J. Son and J. Alves-foss, Covert timing channel capacity of rate monotonic real-time scheduling algorithm in MLS systems, p.1318, 2006.

D. Steinberg, F. Budinsky, M. Paternostro, and E. M. Emf, Eclipse Modeling Framework, 2008.

I. Shin, A. Easwaran, and I. Lee, Hierarchical scheduling framework for virtual clustering of multiprocessors, Euromicro Conference on RealTime Systems, p.181190, 2008.

I. Shin, A. Easwaran, and I. Lee, Hierarchical scheduling framework for virtual clustering of multiprocessors, ECRTS, p.181190, 2008.

D. Smith, J. Frank, and W. Cushing, The anml language, ICAPS Poster session, 2008.

I. Shin and I. Lee, Periodic resource model for compositional realtime guarantees, Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS), p.213, 2003.

S. Hyuk-son, R. Mukkamala, and R. David, Integrating security and real-time requirements using covert channel capacity, IEEE Trans

, Knowl. Data Eng, vol.12, issue.6, p.865879, 2000.

K. Sen, M. Viswanathan, and G. Agha, Statistical model checking of black-box probabilistic systems, CAV, vol.3114, p.202215

. Springer, , 2004.

K. Sen, M. Viswanathan, and G. Agha, On statistical model checking of stochastic systems, CAV, vol.3576, p.266280

. Springer, , 2005.

K. Sen, M. Viswanathan, and G. Agha, Vesta: A statistical model-checker and analyzer for probabilistic systems, Second International Conference on the, p.251252, 2005.

A. Thekkilakattil, R. Dobrin, and S. Punnekkat, Probabilistic preemption control using frequency scaling for sporadic real-time tasks, The 7th IEEE International Symposium on Industrial Embedded Systems, 2012.

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. ,

. Hu, Precisely measuring quantitative information ow: 10k lines of code and beyond, 2016.

V. Varadarajan, T. Ristenpart, and M. Swift,

, Scheduler-based defenses against cross-vm side-channels, Usenix Security, p.687702, 2014.

A. Wald, Sequential Tests of Statistical Hypotheses, The Annals of Mathematical Statistics, vol.16, issue.2, p.117186, 1945.

M. Yoon, S. Mohan, C. Chen, and L. Sha, Taskshuer: A schedule randomization protocol for obfuscation against timing inference attacks in real-time systems, RTAS, p.112, 2016.

L. Hakan and . Younes, Verication and planning for stochastic processes with asynchronous events

P. Pa, . Of-computer, and . Science, , 2005.

L. S. Håkan and . Younes, Error control for probabilistic model checking, International Workshop on Verication, Model Checking, and Abstract Interpretation, p.142156, 2006.

Y. Zhang, D. K. Krecker, C. Gill, and C. Lu,

H. Gautam and . Thaker, Practical schedulability analysis for generalized sporadic tasks in distributed real-time systems, Proceedings of the, 2008.

, Euromicro Conference on Real-Time Systems, ECRTS '08, p.223232, 2008.

, Example of scheduling two tasks using a non-preemptive Scheduling algorithm

T. .. System, 31 2.2 Examples of timed automata with a single clock and one example of the evolution of their clock over time, Light Switch Transition

. .. Ta, Stochastic dispatcher implemented with a stochastic, p.43

, SWA model of a stochastic task

.. .. Swa,

, Examples of the satisfaction of simple temporal modalities over an execution trace

, Examples of satisfaction of some CTL formula

. .. , Graphical representation of the model checking approach, vol.57

, Example of task display generated by the style conguration, p.64

, Main principles of domain-specic tools generation with Cinco, p.64

, Tool chain for generating and using domain-specic analysis frameworks, p.66

, Periodic Resource Model supplier with stochastic budget, p.70

, Example of Hierarchical Scheduling System

, TA template of a stochastic task (T i )

, An action to congure stochastic real-time attributes, p.75

, An action to congure stochastic real-time attributes

. .. Hss, , p.76

. .. Ta,

, A simulation of PRM behavior model

, Probability density distribution for the budgets for the scheduling unit C1, vol.80

, Hierarchical scheduling of avionic tasks

, 83 5.1 F-distribution example with the p-value computed for F=2.23, p.91

.. .. Pareto-eciency-curve,

, Platform layer with 2 processors, 3 hard real-time tasks and 1 soft realtime task

. .. , Application layer with 3 components and 5 actions, p.99

, Mapping between application layer and platform layer, p.99

, Application layer of our case-study model

, Pareto Eciency diagram for optimizing energy consumption and maximum response time of task T 2

, Example Processes with schedule-dependent condential information leakage

. .. , Periodic Solutions for Leakage between hyperperiods, p.115

, Schedulings for the processes in Figure

.. .. Hyperperiodic,

, Number of failures for each combination of preprocessor and scheduling algorithm, out of ?30,000 experiments, vol.14

, 123 6.6 Information leakage of the solutions for each combination of pre-and postprocessor (except Total Merge) using the EDF scheduling algorithm, p.124