TY - GEN
T1 - Beetle
T2 - 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016
AU - Levy, Amit
AU - Hong, James
AU - Riliskis, Laurynas
AU - Levis, Philip
AU - Winstein, Keith
N1 - Publisher Copyright:
© 2016 ACM.
PY - 2016/6/20
Y1 - 2016/6/20
N2 - The next generation of computing peripherals will be low- power ubiquitous computing devices such as door locks, smart watches, and heart rate monitors. Bluetooth Low En- ergy is a primary protocol for connecting such peripherals to mobile and gateway devices. Current operating system support for Bluetooth Low Energy forces peripherals into vertical application silos. As a result, simple, intuitive ap- plications such as opening a door with a smart watch or simultaneously logging and viewing heart rate data are im- possible. We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without requiring the operating system to understand hardware functionality, fine-grained access control to peripheral device resources, and transpar- ent access to peripherals connected over the network.We de- scribe a series of novel applications that are impossible with existing abstractions but simple to implement with Beetle.
AB - The next generation of computing peripherals will be low- power ubiquitous computing devices such as door locks, smart watches, and heart rate monitors. Bluetooth Low En- ergy is a primary protocol for connecting such peripherals to mobile and gateway devices. Current operating system support for Bluetooth Low Energy forces peripherals into vertical application silos. As a result, simple, intuitive ap- plications such as opening a door with a smart watch or simultaneously logging and viewing heart rate data are im- possible. We present Beetle, a new hardware interface that virtualizes peripherals at the application layer, allowing safe access by multiple programs without requiring the operating system to understand hardware functionality, fine-grained access control to peripheral device resources, and transpar- ent access to peripherals connected over the network.We de- scribe a series of novel applications that are impossible with existing abstractions but simple to implement with Beetle.
UR - http://www.scopus.com/inward/record.url?scp=84979895757&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84979895757&partnerID=8YFLogxK
U2 - 10.1145/2906388.2906414s
DO - 10.1145/2906388.2906414s
M3 - Conference contribution
AN - SCOPUS:84979895757
T3 - MobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
SP - 111
EP - 122
BT - MobiSys 2016 - Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
PB - Association for Computing Machinery, Inc
Y2 - 25 June 2016 through 30 June 2016
ER -