Security & Monitoring
task blocking, starving others, or running longer than designed. Per-thread execution data exposes these problems directly. It allows engineers to see which task deviated from its normal behaviour and how that deviation propagated through the system. This level of granularity is essential for understanding silent failures that do not affect the entire system uniformly.
analysis to proactive runtime observability. These capabilities align closely with the broader direction the embedded industry is taking and reflect many of the themes now emerging around runtime visibility and execution integrity.
TaskMonitor in Percepio Detect 2025.2 continuously validates per-thread execution behaviour and automatically captures trace data when anomalies occur.
How can systems capture useful forensic data without continuous high-overhead tracing? The key is selective and conditional data capture. Rather than tracing everything all the time, systems can monitor lightweight runtime indicators and only record detailed data when something abnormal happens. In Percepio Detect, this includes monitoring thread activity, CPU usage, fault exceptions, and latency thresholds. When an anomaly is detected, the
system automatically captures a focused trace or a highly selective core dump. This approach keeps overhead low during normal operation while still preserving the critical information needed for post-event analysis.
How does your latest release refl ect these broader trends in embedded monitoring?
Percepio Detect 2025.2 was designed specifically to address non-crashing failures
and firmware freezes. A key addition is the TaskMonitor feature, which continuously checks per-thread execution behaviour and detects deviations in near real time. When an anomaly occurs, the system automatically captures trace data before a reset or power cycle. We also improved core dump efficiency, making it possible to store meaningful forensic data in just a few hundred bytes. Together, these features shift monitoring from reactive crash
How do you expect embedded security and monitoring practices to evolve over the next few years? We expect runtime observability to become a standard part of embedded security and quality strategies. As systems grow more autonomous and software-defined, engineers will need continuous insight into how software actually behaves in the field, not just how it was designed to behave. Monitoring execution integrity, timing predictability, and behavioural anomalies will be just as important as protecting communication channels or validating firmware at boot. In that sense, observability becomes a foundation for both reliability and security in next- generation embedded systems.
www.percepio.com
Is your product or service getting worldwide exposure?
In addition to the regular users of the CIE website we get 12,500 new users every year across the globe from Japan to the USA, from China to Germany and many more.
Want to be part of the action? Then contact: Tony Patman | 01622 687031 |
tpatman@cieonline.co.uk www.cieonline.co.uk Sophie Scott | 01622 699193 |
sscott@cieonline.co.uk Components in Electronics March 2026 21
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44