Embedded systems often come with constrained memory footprints. It is therefore essential to ensure that software running on such platforms fulfils memory usage specifications at compile-time, to prevent memory-related software failure after deployment. Previous proposals on memory usage verification are not satisfactory as they usually can only handle restricted subsets of programs, especially when shared mutable data structures are involved. In this paper, we propose a simple but novel solution. We instrument programs with explicit memory operations so that memory usage verification can be done along with the verification of other properties, using an automated verification system Hip/Sleek developed recently by Chin et al.[10,19]. The in...
Physical memory acquisition is a prerequisite when performing memory forensics, referring to a set o...
dedicated to the memory of Kohei Honda Abstract Multiprocessors implement weak memory models, but pr...
Contemporary System-on-Chip (SoC) become more and more complex, as increasing integration results in...
10.1007/978-3-642-04761-9_14Lecture Notes in Computer Science (including subseries Lecture Notes in ...
We present a new type system for an object-oriented (OO) language that characterizes the sizes of da...
Automated verification of operating system kernels is a challenging problem, partly due to the use o...
Software is large, complex, and error-prone. According to the US National Institute of Standards and...
The challenges faced in securing embedded computing systems against multifaceted memory safety vulne...
International audienceThe ever increasing complexity of distributed systems mandates to formally ver...
HIPimm, an extension of the HIP/SLEEK automatic verification system, offers immutability guarantees ...
Memory forensics has become a powerful tool for the detection and analysis of malicious software. It...
Part 3: VerificationInternational audienceMemory safety plays a crucial role in concurrent hardware/...
The proliferation of software across all aspects of people's life means that software failure can br...
Verification of concurrent data structures is one of the most challenging tasks in software verifica...
In the ever-developing world of technology, more and more situations arise where the life of many pe...
Physical memory acquisition is a prerequisite when performing memory forensics, referring to a set o...
dedicated to the memory of Kohei Honda Abstract Multiprocessors implement weak memory models, but pr...
Contemporary System-on-Chip (SoC) become more and more complex, as increasing integration results in...
10.1007/978-3-642-04761-9_14Lecture Notes in Computer Science (including subseries Lecture Notes in ...
We present a new type system for an object-oriented (OO) language that characterizes the sizes of da...
Automated verification of operating system kernels is a challenging problem, partly due to the use o...
Software is large, complex, and error-prone. According to the US National Institute of Standards and...
The challenges faced in securing embedded computing systems against multifaceted memory safety vulne...
International audienceThe ever increasing complexity of distributed systems mandates to formally ver...
HIPimm, an extension of the HIP/SLEEK automatic verification system, offers immutability guarantees ...
Memory forensics has become a powerful tool for the detection and analysis of malicious software. It...
Part 3: VerificationInternational audienceMemory safety plays a crucial role in concurrent hardware/...
The proliferation of software across all aspects of people's life means that software failure can br...
Verification of concurrent data structures is one of the most challenging tasks in software verifica...
In the ever-developing world of technology, more and more situations arise where the life of many pe...
Physical memory acquisition is a prerequisite when performing memory forensics, referring to a set o...
dedicated to the memory of Kohei Honda Abstract Multiprocessors implement weak memory models, but pr...
Contemporary System-on-Chip (SoC) become more and more complex, as increasing integration results in...