Verifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation
Reinhold Heckmann,Christian Ferdinand +1 more
- Vol. 1, pp 618-619
Reads0
Chats0
TLDR
In this paper, abstract interpretation is used to determine the properties of embedded software, such as stack usage and the timing behavior of embedded programs, and its results are used as input to more advanced analyses.Abstract:
Static program analysis by abstract interpretation is an efficient method to determine the properties of embedded software. One example is value analysis, which determines the values stored in the processor registers. Its results are used as input to more advanced analyses, which ultimately yield information about the stack usage and the timing behavior of embedded software.read more
Citations
More filters
Predictable mapping of streaming applications on multiprocessors
TL;DR: The Synchronous Data Flow (SDF) model is erg geschikt voor het modelleren of applicaties that werken met gegevensstromen as mentioned in this paper.
Journal ArticleDOI
Towards trustworthy computing systems: taking microkernels to the next level
TL;DR: This paper argues that microkernels are the best approach for delivering truly trustworthy computer systems in the foreseeable future and presents the NICTA operating-systems research vision, centred around the L4 microkernel and based on four core projects.
Patent
System and method for securing web application code and verifying correctness of software
TL;DR: In this article, a software application to be analyzed is transformed into an abstract representation which preserves its information flow properties, and the abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking.
Studying co-running avionic real-time applications on multi-core COTS architectures
TL;DR: Measure techniques based on a set of dedicated stressing benchmarks and architecture hardware monitors are introduced to characterize the architecture, by identifying the shared hardware resources and their associated contention mechanisms, and the application, by identify which sharedHardware resources it is sensitive to.
Journal ArticleDOI
Memory overflow protection for embedded systems using run-time checks, reuse, and compression
TL;DR: A method to detect memory overflows using compiler-inserted software run-time checks and techniques to grow the stack or heap segment after they overflow, into previously unutilized space, such as dead variables, free holes in the heap, and space freed by compressing live variables are presented.
References
More filters
Proceedings ArticleDOI
Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints
Patrick Cousot,Radhia Cousot +1 more
TL;DR: In this paper, the abstract interpretation of programs is used to describe computations in another universe of abstract objects, so that the results of abstract execution give some information on the actual computations.
Book ChapterDOI
Reliable and Precise WCET Determination for a Real-Life Processor
Christian Ferdinand,Reinhold Heckmann,Marc Langenbach,Florian Martin,Michael Schmidt,Henrik Theiling,Stephan Thesing,Reinhard Wilhelm +7 more
TL;DR: An overview of the methods used in the USES approach to WCET determination is given, a fully functional prototype system for the Motorola ColdFire MCF 5307 processor is presented, the implications of processor design on the predictability of behavior described, and experiences with analyzing applications running on this processor reported.