Figure 7: Detailed Latency between θ
A
and θ
B
.
Figure 8: Detailed Latency between θ
A
and θ
B
in Secure Model.
embedded systems. APCOSEC, Asia-Pacific Council
on Systems Engineering, pages 8–11.
Blanchet, B., Smyth, B., Cheval, V., and Sylvestre, M.
(2018). Proverif 2.00: Automatic cryptographic pro-
tocol verifier, user manual and tutorial. Version from,
pages 05–16.
Chai, H., Zhang, G., Zhou, J., Sun, J., Huang, L., and Wang,
T. (2019). A short review of security-aware techniques
in real-time embedded systems. Journal of Circuits,
Systems and Computers, 28(02):1930002.
Davis, R. I. (2014). A review of fixed priority and edf
scheduling for hard real-time uniprocessor systems.
ACM SIGBED Review, 11(1):8–19.
DeAntoni, J. and Mallet, F. (2012). Timesquare: Treat your
models with logical time. In International Conference
on Modelling Techniques and Tools for Computer Per-
formance Evaluation, pages 34–41. Springer.
Friedenthal, S., Moore, A., and Steiner, R. (2014). A prac-
tical guide to SysML: the systems modeling language.
Morgan Kaufmann.
Fujdiak, R., Blazek, P., Apvrille, L., Martinasek, Z.,
Mlynek, P., Pacalet, R., Smekal, D., Mrnustik, P.,
Barabas, M., and Zoor, M. (2019). Modeling the
trade-off between security and performance to sup-
port the product life cycle. In 2019 8th Mediterranean
Conference on Embedded Computing (MECO), pages
1–6. IEEE.
Fujdiak, R., Mlynek, P., Blazek, P., Barabas, M., and Mr-
nustik, P. (2018). Seeking the relation between per-
formance and security in modern systems: Metrics
and measures. In 2018 41st International Conference
on Telecommunications and Signal Processing (TSP),
pages 1–5. IEEE.
Gruber, T., Schmittner, C., Matschnig, M., and Fischer, B.
(2018). Co-engineering-in-the-loop. In International
Conference on Computer Safety, Reliability, and Se-
curity, pages 151–163. Springer.
Jiang, W., Guo, Z., Ma, Y., and Sang, N. (2013).
Measurement-based research on cryptographic algo-
rithms for embedded real-time systems. Journal of
Systems Architecture, 59(10):1394–1404.
Kangas, T., Kukkala, P., Orsila, H., Salminen, E., Hännikäi-
nen, M., Hämäläinen, T. D., Riihimäki, J., and Ku-
usilinna, K. (2006). Uml-based multiprocessor soc
design framework. ACM Transactions on Embedded
Computing Systems (TECS), 5(2):281–320.
Kienhuis, B., Deprettere, E. F., Van der Wolf, P., and
Vissers, K. (2001). A methodology to design pro-
grammable embedded systems. In International
Workshop on Embedded Computer Systems, pages
18–37. Springer.
Knorreck, D. (2011). UML-based design space exploration,
fast simulation and static analysis. PhD thesis, Tele-
com ParisTech.
Kocher, P., Lee, R., McGraw, G., Raghunathan, A.,
Moderator-Ravi, S., and Moderator-Ravi, S. (2004).
Security as a new dimension in embedded system de-
sign. In Proceedings of the 41st annual Design Au-
tomation Conference, pages 753–760. ACM.
Li, L. (2018). Approche orientée modèles pour la sûreté et
la sécurité des systèmes embarqués. PhD thesis, Paris
Saclay.
Li, L. W., Lugou, F., and Apvrille, L. (2017). Security-
aware modeling and analysis for hw/sw partitioning.
In 5th International Conference on Model-Driven En-
gineering and Software Development (Modelsward),
Porto, Portugal.
Thiele, L., Wandeler, E., and Haid, W. (2007). Performance
analysis of distributed embedded systems. In Interna-
tional Conference On Embedded Software: Proceed-
ings of the 7 th ACM & IEEE international conference
on Embedded software, volume 30, pages 10–10. Cite-
seer.
Viehl, A., Schönwald, T., Bringmann, O., and Rosenstiel,
W. (2006). Formal performance analysis and simu-
lation of uml/sysml models for esl design. In Pro-
ceedings of the conference on Design, automation and
test in Europe: Proceedings, pages 242–247. Euro-
pean Design and Automation Association.
MODELSWARD 2020 - 8th International Conference on Model-Driven Engineering and Software Development
380