scispace - formally typeset
Open AccessProceedings ArticleDOI

Verifying Safety-Critical Timing and Memory-Usage Properties of Embedded Software by Abstract Interpretation

Reinhold Heckmann, +1 more
- Vol. 1, pp 618-619
Reads0
Chats0
TLDR
In this paper, abstract interpretation is used to determine the properties of embedded software, such as stack usage and the timing behavior of embedded programs, and its results are used as input to more advanced analyses.
Abstract
Static program analysis by abstract interpretation is an efficient method to determine the properties of embedded software. One example is value analysis, which determines the values stored in the processor registers. Its results are used as input to more advanced analyses, which ultimately yield information about the stack usage and the timing behavior of embedded software.

read more

Content maybe subject to copyright    Report

Citations
More filters

Predictable mapping of streaming applications on multiprocessors

Sander Stuijk
TL;DR: The Synchronous Data Flow (SDF) model is erg geschikt voor het modelleren of applicaties that werken met gegevensstromen as mentioned in this paper.
Journal ArticleDOI

Towards trustworthy computing systems: taking microkernels to the next level

TL;DR: This paper argues that microkernels are the best approach for delivering truly trustworthy computer systems in the foreseeable future and presents the NICTA operating-systems research vision, centred around the L4 microkernel and based on four core projects.
Patent

System and method for securing web application code and verifying correctness of software

TL;DR: In this article, a software application to be analyzed is transformed into an abstract representation which preserves its information flow properties, and the abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking.

Studying co-running avionic real-time applications on multi-core COTS architectures

TL;DR: Measure techniques based on a set of dedicated stressing benchmarks and architecture hardware monitors are introduced to characterize the architecture, by identifying the shared hardware resources and their associated contention mechanisms, and the application, by identify which sharedHardware resources it is sensitive to.
Journal ArticleDOI

Memory overflow protection for embedded systems using run-time checks, reuse, and compression

TL;DR: A method to detect memory overflows using compiler-inserted software run-time checks and techniques to grow the stack or heap segment after they overflow, into previously unutilized space, such as dead variables, free holes in the heap, and space freed by compressing live variables are presented.
References
More filters
Proceedings ArticleDOI

Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints

TL;DR: In this paper, the abstract interpretation of programs is used to describe computations in another universe of abstract objects, so that the results of abstract execution give some information on the actual computations.
Book ChapterDOI

Reliable and Precise WCET Determination for a Real-Life Processor

TL;DR: An overview of the methods used in the USES approach to WCET determination is given, a fully functional prototype system for the Motorola ColdFire MCF 5307 processor is presented, the implications of processor design on the predictability of behavior described, and experiences with analyzing applications running on this processor reported.
Related Papers (5)