Projects
A Future Software Defines Internet Core and advanced Cloud Research Infrastructure Ghent University
* Flexible cloud environment:
- 8 cloud servers: flexible configuration, in total able to run more then 2000 virtual machines (228,8 kEUR)
- Ultra fast cloud storage (SSD based) 40TB: 62,5 kEUR
- Fast and big cloud storage (SATA based) 500TB: 61,7 kEUR
- 100 Gb/s infiniband storage network: 31 kEUR
- GPU cloud: 23,1 kEUR
- Low power cloud: 32 kEUR
* Core network:
- HP 12518 software definable ...
Software for cooperative autonomous systems KU Leuven
Developing software for cooperative autonomous systems is challenging, especially for safety-critical systems such as UAVs. A problem with current approaches in the design of UAV software is handling conflicting goals. Currently, there is no way to detect/avoid conflicting goals in the UAV software in a consistent and predictable manner. Component-based design and development can bring inherent reliability to an airborne system, however, ...
Software Architecture and Modules for Unified RAdio control Ghent University
SAMURAI main objective of the Project is to design, evaluate and optimize a software architecture for uniform radio control off-the-shelf wireless hardware and Software Defined Radio's (SDR), which also supports wireless network intelligence. This allows companies to: - reduce their (re) development costs by using a validated technology that adapts to the underlying hardware and enables reuse in different products. - unused functionality to ...
Migration to agile design of embedded software that recovers itself after errors due to external factors KU Leuven
This thesis focuses on the selection and implementation of software-implemented countermeasures designed to detect control flow errors in embedded systems. A control flow error is an erroneous jump throughout an executing program induced by external disturbances. These disturbances, such as electromagnetic interference, can introduce bit-flips in different components of a system’s hardware. In turn, these introduced bit-flips affect the ...
Low-level software security. KU Leuven
With the rising popularity of the IoT (Internet of Things), the use of small, low-power embedded devices is rapidly increasing. Unfortunately, these kind of devices often lack the security features we are grown used to in the domain of desktop and server computing. However, in a context where multiple mutually distrusting stakeholders are able to share an IoT infrastructure to process sensitive data, the lack of, for example, basic software ...
Modular Semi-Automated Formal Verification of Security-Critical Software KU Leuven
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in size and complexity. Since we almost have no choice but to trust these programs with our secrets and privacy, managing the quality of software has become ever more important. Countless techniques have been developed to demonstrate the correctness of security-critical software and this thesis extends on one of those: i.e. formal ...
Testing of software with concurrent behavior KU Leuven
The lock-based shared memory model has proven error prone and difficult to test. Principally, non-deterministic behavior should be isolated, to facilitate testing the deterministic part. Using state space exploration, it is possible to deterministically run through different paths in the state space. However computational restrictions limit this exploration to a fixed number of thread interleavings. Nevertheless, as a testing strategy it is ...
Modular Semi-automatic Formal Verification of Critical Systems Software KU Leuven
In the first part of this thesis, we present a case study on successfully verifying the Linux USB BP keyboard driver. Our verification approach is (a) sound, (b) takes into account dynamic memory allocation, complex API rules and concurrency, and (c) is applied on a real kernel driver which was not written with verification in mind. We employ VeriFast, a software verifier based on separation logic. Besides showing that it is possible to ...