International audienceOn real-time systems running under timing constraints, scheduling can be performed when one is aware of the worst case execution time (WCET) of tasks. Usually, the WCET of a task is unknown and schedulers make use of safe over-approximations given by static WCET analysis. To reduce the over-approximation, WCET analysis has to gain information about the underlying hardware behavior, such as pipelines and caches. In this paper, we focus on the cache analysis, which classifies memory accesses as hits/misses according to the set of possible cache states. We propose to refine the results of classical cache analysis using a model checker, introducing a new cache model for the least recently used (LRU) policy
Cache memories have been extensively used to bridge the gap between high speed processors and relati...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
International audienceFor applications in worst-case execution time analysis and in security, it is ...
International audienceOn real-time systems running under timing constraints, scheduling can be perfo...
Worst-Case Execution Time (WCET) is an important metric for programs running on real-time systems, a...
Safety critical real-time applications in aviation, automotive and industrial automation have to gua...
International audienceCache memories in modern embedded processors are known to improve average memo...
When constructing real-time systems, safe and tight estimations of the worst case execution time (WC...
Cache memories have been introduced to decrease the access time to the information due to the increa...
An accurate and reliable estimation of a task's worst case execution time (WCET) is crucial for...
While caches have become invaluable for higher-end architectures due to their ability to hide, in pa...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
Abstract — Caches in Embedded Systems improve average case performance, but they are a source of unp...
Abstract—Analyzing the worst-case execution time, the WCET, of a program or task is an important act...
Worst-case execution time (WCET) analysis of systems with data caches is one of the key challenges i...
Cache memories have been extensively used to bridge the gap between high speed processors and relati...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
International audienceFor applications in worst-case execution time analysis and in security, it is ...
International audienceOn real-time systems running under timing constraints, scheduling can be perfo...
Worst-Case Execution Time (WCET) is an important metric for programs running on real-time systems, a...
Safety critical real-time applications in aviation, automotive and industrial automation have to gua...
International audienceCache memories in modern embedded processors are known to improve average memo...
When constructing real-time systems, safe and tight estimations of the worst case execution time (WC...
Cache memories have been introduced to decrease the access time to the information due to the increa...
An accurate and reliable estimation of a task's worst case execution time (WCET) is crucial for...
While caches have become invaluable for higher-end architectures due to their ability to hide, in pa...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
Abstract — Caches in Embedded Systems improve average case performance, but they are a source of unp...
Abstract—Analyzing the worst-case execution time, the WCET, of a program or task is an important act...
Worst-case execution time (WCET) analysis of systems with data caches is one of the key challenges i...
Cache memories have been extensively used to bridge the gap between high speed processors and relati...
With the advent of increasingly complex hardware in real-time embedded systems (processors with perf...
International audienceFor applications in worst-case execution time analysis and in security, it is ...