In this work we present a verification framework for applications for the embedded system operating system Contiki, based on the software model checking tool CBMC. A challenge when verifying such systems is the modeling of the hardware environment, especially the handling of interrupts. After an introduction to the Contiki system, we discuss approaches to model interrupts at the level of hardware independent C source code and present a new modeling approach for periodically occurring interrupts. Finally, verification results for these approaches based on different Contiki applications are presented
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
Interrupt behaviors, especially the external ones, are diffi-cult to verify in a microprocessor desi...
The main building blocks for the internet of things are connected embedded systems. Often these syst...
Verification of embedded systems is a challenge due to the tight combination of hardware and softwar...
In this work an approach is shown, how to verify embedded system applications written for the operat...
Embedded control programs are hard to analyse because their behaviour depends on how they interact w...
Information security is important in academia, industry and government. The use of formal methods in...
The interrupt mechanism in a system-on-chip (SoC) joins the SoCs hardware and software behaviors. We...
Diese Arbeit stellt einen Ansatz für die formale Verifikation von Anwendungen für das Betriebssystem...
Pervasive formal verification guarantees highest reliability of complex multi-core computer systems....
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
Abstract—Interrupt-driven software is difficult to test and debug, especially when interrupts can be...
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
Abstract—Interrupt behaviors, particularly the external ones, are difficult to verify in a microproc...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
Interrupt behaviors, especially the external ones, are diffi-cult to verify in a microprocessor desi...
The main building blocks for the internet of things are connected embedded systems. Often these syst...
Verification of embedded systems is a challenge due to the tight combination of hardware and softwar...
In this work an approach is shown, how to verify embedded system applications written for the operat...
Embedded control programs are hard to analyse because their behaviour depends on how they interact w...
Information security is important in academia, industry and government. The use of formal methods in...
The interrupt mechanism in a system-on-chip (SoC) joins the SoCs hardware and software behaviors. We...
Diese Arbeit stellt einen Ansatz für die formale Verifikation von Anwendungen für das Betriebssystem...
Pervasive formal verification guarantees highest reliability of complex multi-core computer systems....
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
Abstract—Interrupt-driven software is difficult to test and debug, especially when interrupts can be...
Interrupt-driven software is difficult to test and debug, especially when interrupts can be nested a...
Abstract—Interrupt behaviors, particularly the external ones, are difficult to verify in a microproc...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
We consider software written for networked, wireless sensor nodes, and specialize software verificat...
Interrupt behaviors, especially the external ones, are diffi-cult to verify in a microprocessor desi...