Ubiquitous embedded systems are often resource-constrained. Developing software for these systems should take into account resources such as memory space. In this paper, we develop and implement an analysis framework to infer statically stack usage bounds for assembly-level programs in abstract Java Bytecode. Our stack bound inference process, extended from a theoretical framework proposed earlier by some of the authors, is composed of deductive inference rules in multiple passes. Based on these rules, a usable tool has been developed for processing programs to capture the stack memory needs of each procedure in terms of the symbolic values of its parameters. The final result contains path-sensitive information to achieve better precision. ...
Controlling resource usage is important for the reliability, efficiency and security of software sys...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
10.1109/TASE.2010.24Proceedings - 2010 4th International Symposium on Theoretical Aspects of Softwar...
In real-time and embedded systems, it is often necessary to place conservative upper bounds on the m...
AbstractAutomatic cost analysis of programs has been traditionally concentrated on a reduced number ...
For real-time and embedded systems, limiting the consumption of time and memory resources is often a...
For real-time and embedded systems, limiting the consumption of time and memory resources is often a...
For real-time and embedded systems limiting the consump-tion of time and memory resources is often a...
Recent work in resource analysis has translated the idea of amortised resource analysis to imperativ...
costa [2] is a research prototype which performs automatic program analysis, in the style of [9, 7, ...
This paper describes costa, a cost and termination analyzer for Java bytecode. The system receives a...
Abstract. This paper presents a formal design of a tool for statically establishing the upper bound ...
We address in this paper the problem of statically determining whether a JavaCard applet may produce...
Automatic cost analysis of programs has been traditionally studied in terms of a number of concrete,...
Controlling resource usage is important for the reliability, efficiency and security of software sys...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...
10.1109/TASE.2010.24Proceedings - 2010 4th International Symposium on Theoretical Aspects of Softwar...
In real-time and embedded systems, it is often necessary to place conservative upper bounds on the m...
AbstractAutomatic cost analysis of programs has been traditionally concentrated on a reduced number ...
For real-time and embedded systems, limiting the consumption of time and memory resources is often a...
For real-time and embedded systems, limiting the consumption of time and memory resources is often a...
For real-time and embedded systems limiting the consump-tion of time and memory resources is often a...
Recent work in resource analysis has translated the idea of amortised resource analysis to imperativ...
costa [2] is a research prototype which performs automatic program analysis, in the style of [9, 7, ...
This paper describes costa, a cost and termination analyzer for Java bytecode. The system receives a...
Abstract. This paper presents a formal design of a tool for statically establishing the upper bound ...
We address in this paper the problem of statically determining whether a JavaCard applet may produce...
Automatic cost analysis of programs has been traditionally studied in terms of a number of concrete,...
Controlling resource usage is important for the reliability, efficiency and security of software sys...
Dynamic array bound checks are crucial elements for the security of a Java Virtual Machines. These d...
AbstractWe propose two control flow analyses for the Java bytecode. They safely approximate the set ...