skip to main content
10.1145/1529282.1529347acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Building a self-healing embedded system in a multi-OS environment

Published: 08 March 2009 Publication History

Abstract

In this paper we describe our approach to improve dependability of a commodity OS for embedded systems. Usually it is too difficult for end-users to resolve the problem inside a single OS, especially for embedded systems. We propose a self-healing mechanism for Linux kernel to improve the system dependability without any operations by administrators. This paper presents our white box approach for monitoring and recovering Linux kernel. Key components are a system monitor and a virtual machine monitor. The system monitor is used to detect the inconsistency of data structures inside Linux kernel. The virtual machine monitor provides a multi-OS environment and it isolates the system monitor from Linux kernel. In a multi-OS environment, the system monitor is able to resolve failures inside Linux kernel without stopping crucial services running on another OS. We have developed a prototype for an embedded system to verify our approach. The experiment results show that our system can remove hidden processes and reload buggy kernel modules. The performance evaluation results show that our self-healing mechanism can be used even when Linux kernel is heavily-loaded and the overhead of the system monitor is vanishingly small in actual use.

References

[1]
The Linux-HA project. http://linux-ha.org/ visited June 2008.
[2]
SH-2007 by ITO Co., Ltd. http://sh2000.sh-linux.org/sh2007.html visited August 2008.
[3]
stress project. http://weather.ou.edu/apw/projects/stress/ visited August 2008.
[4]
Blue screen. http://support.microsoft.com/kb/q129845 visited June 2008. visited June 2008.
[5]
M. Baker and M. Sullivan. The recovery box: Using fast recovery to provide high availability in the UNIX environment. In USENIX, pages 31--44, Summer 1992.
[6]
B. Beizer. Software is different. Ann. Softw. Eng., 10(1--4): 293--310, 2000.
[7]
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot --- a technique for cheap recovery. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, Berkeley, CA, USA, 2004. USENIX Association.
[8]
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. SIGOPS Oper. Syst. Rev., 35(5): 73--88, 2001.
[9]
F. M. David and R. H. Campbell. Building a self-healing operating system. In Dependable, Autonomic and Secure Computing, 2007. DASC 2007. Third IEEE International Symposium, pages 3--10, 2007.
[10]
B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. In OOPSLA '03: Proceedings of the 18th annual ACM SIGPLAN conference on Object-oriented programing, systems, languages, and applications, pages 78--95, New York, NY, USA, 2003. ACM.
[11]
B. Demsky and M. Rinard. Data structure repair using goal-directed reasoning. In ICSE '05: Proceedings of the 27th international conference on Software engineering, pages 176--185, New York, NY, USA, 2005. ACM.
[12]
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. SIGOPS Oper. Syst. Rev., 37(5): 193--206, 2003.
[13]
H. Ishikawa, A. Courbot, and T. Nakajima. A framework for self-healing device drivers. In SASO '08: Proceedings of the 2nd IEEE International Conference on Self-Adaptive and Self-Organizing Systems, October 2008.
[14]
X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 128--138, New York, NY, USA, 2007. ACM.
[15]
S. T. Jones, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau. VMM-based hidden process detection and identification using lycosid. In VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 91--100, New York, NY, USA, 2008. ACM.
[16]
W. Kanda, Y. Yumura, Y. Kinebuchi, K. Makijima, and T. Nakajima. SPUMONE: Lightweight cpu virtualization layer for embedded systems. In EUC '08: Proceedings of The 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Shanghai, China, 2008.
[17]
J. O. Kephart and D. M. Chess. The vision of autonomic computing. Computer, 36(1): 41--50, 2003.
[18]
B. Leslie, C. van Schaik, and G. Heiser. Wombat: a portable user-mode linux for embedded systems. In Proceedings of the 6th Linux. Conf. Au, Canberra, Australia, 2005.
[19]
J. Liedtke. On micro-kernel construction. SIGOPS Oper. Syst. Rev., 29(5): 237--250, 1995.
[20]
H. MAEJIMA, M. KAINAGA, and K. UCHIYAMA. Design and architecture for low-power/high-speed RISC microprocessor: SuperH (special issue on low-power and high-speed lsi technologies). IEICE transactions on electronics, 80(12): 1539--1545, 1997.
[21]
R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a MAC-based security architecture for the Xen open-source hypervisor. Computer Security Applications Conference, 21st Annual, 0: 10 pp.--, 2005.
[22]
H. Takada. Introduction to the TOPPERS project " open source RTOS for embedded systems. In ISORC '03: Proceedings of the Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC'03), page 44, Washington, DC, USA, 2003. IEEE Computer Society.
[23]
H. Takada, S. Iiyama, T. Kindaichi, and S. Hachiya. Linux on ITRON: A hybrid operating system architecture for embedded systems. In SAINT-W '02: Proceedings of the 2002 Symposium on Applications and the Internet (SAINT) Workshops, page 4, Washington, DC, USA, 2002. IEEE Computer Society.
[24]
Y. Wen, J. Zhao, and H. Wang. Implicit detection of hidden processes with a local-booted virtual machine. Information Security and Assurance, 2008. ISA 2008. International Conference on, pages 150--155, 2008.
[25]
C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: general security support for the linux kernel. Foundations of Intrusion Tolerant Systems, 2003 {Organically Assured and Survivable Information Systems}, pages 213--226, 2003.
[26]
V. Yodaiken. The RTLinux manifesto. In The Proceedings of the 5th Linux Expo, Raleigh, North Carolina, 1999.

Cited By

View all
  • (2013)OrthrosProceedings of the 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing10.1109/PRDC.2013.54(318-327)Online publication date: 2-Dec-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
March 2009
2347 pages
ISBN:9781605581668
DOI:10.1145/1529282
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. monitoring
  2. multi-OS environment
  3. self-healing

Qualifiers

  • Research-article

Conference

SAC09
Sponsor:
SAC09: The 2009 ACM Symposium on Applied Computing
March 8, 2009 - March 12, 2008
Hawaii, Honolulu

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)OrthrosProceedings of the 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing10.1109/PRDC.2013.54(318-327)Online publication date: 2-Dec-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media