Study and Analysis a Powerful Debug Method for Smart Mobile Systems

Article Preview

Abstract:

When dealing with such complex systems such as the software package of a smart mobile phone, it is necessary to apply powerful methods to detect and report errors when they occur. This paper probes and analyzes a powerful debug method called trap and exception handling, which is supported by the ARM platforms. The method can easily capture some valuable debug information. When a fatal error occurs during runtime or system detects an abnormal, a trap or an exception shall be logged and stored in the non-volatile random access memory (NVRAM). The information must be enough and easy for engineer to analyze the software error.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4270-4273

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Kazuhiko Kato, Safe and secure execution mechanisms for mobile objects, Lecture Notes in Computer Science, Vol. 1222, pp.201-211, (1997).

DOI: 10.1007/3-540-62852-5_15

Google Scholar

[2] Wangyu Kim, Non-preemptive demand paging technique for NAND flash-based real-time embedded systems, IEEE Transactions on Consumer Electronics, Vol. 56 Issue. 3, pp.1516-1523, Aug, (2010).

DOI: 10.1109/tce.2010.5606291

Google Scholar

[3] Steve Heath, Embedded systems design. Newnes, London, December 25, 2002. Romanovsky, C. Dony, A. Tripathi and J. L. Knudsen, Exception Handling in Object Oriented Systems: Towards Emerging Application Areas and New Programming Paradigms, Lecture Notes in Computer Science, Vol. 3013, pp.1-10, (2004).

DOI: 10.1007/978-3-540-25934-3_1

Google Scholar

[4] S. C. Watt, C. B. Dornan, L. Orion, N. Chaussade, Exception types within a secure processing system, United States Patent, No. US-761105B2, Feb, (2010).

Google Scholar

[5] Min-Jae Kim, Jin-Young Lee, Hye-Young Chang and Philip A. Wilsey, Design and Performance Evaluation of Binary Code Packing for Protecting Embedded Software against Reverse Engineering, 13th IEEE International Symposium on Object/Component/ Service- Oriented Real-Time Distributed Computing, Carmona, Spain , May 05-May 06, (2010).

DOI: 10.1109/isorc.2010.23

Google Scholar