-
1
-
-
84881109329
-
-
Avionics Application Software Standard Interface, Nov 2012, ARINC Standard 653
-
Avionics Application Software Standard Interface, Nov 2012, ARINC Standard 653.
-
-
-
-
2
-
-
84862134556
-
Operating systems technology for converged ECUs
-
Hamburg, Germany: ISITS, Nov
-
A. Hergenhan and G. Heiser, "Operating systems technology for converged ECUs," in 6th Emb. Security in Cars Conf. (escar). Hamburg, Germany: ISITS, Nov 2008.
-
(2008)
6th Emb. Security in Cars Conf. (Escar)
-
-
Hergenhan, A.1
Heiser, G.2
-
3
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Big Sky, MT, USA: ACM, Oct
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood, "seL4: Formal verification of an OS kernel," in 22nd SOSP. Big Sky, MT, USA: ACM, Oct 2009, pp. 207-220.
-
(2009)
22nd SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
4
-
-
84856547218
-
Timing analysis of a protected operating system kernel
-
Vienna, Austria, Nov
-
B. Blackham, Y. Shi, S. Chattopadhyay, A. Roychoudhury, and G. Heiser, "Timing analysis of a protected operating system kernel," in 32nd RTSS, Vienna, Austria, Nov 2011, pp. 339-348.
-
(2011)
32nd RTSS
, pp. 339-348
-
-
Blackham, B.1
Shi, Y.2
Chattopadhyay, S.3
Roychoudhury, A.4
Heiser, G.5
-
5
-
-
84860586287
-
Improving interrupt response time in a verifiable protected microkernel
-
Bern, Switzerland, Apr
-
B. Blackham, Y. Shi, and G. Heiser, "Improving interrupt response time in a verifiable protected microkernel," in 7th EuroSys Conf., Bern, Switzerland, Apr 2012, pp. 323-336.
-
(2012)
7th EuroSys Conf.
, pp. 323-336
-
-
Blackham, B.1
Shi, Y.2
Heiser, G.3
-
6
-
-
77955256819
-
A trustworthy monadic formalization of the ARMv7 instruction set architecture
-
M. Kaufmann and L. C. Paulson, Eds. Edinburgh, UK: Springer-Verlag, Jul
-
A. Fox and M. Myreen, "A trustworthy monadic formalization of the ARMv7 instruction set architecture," in 1st ITP, ser. LNCS, M. Kaufmann and L. C. Paulson, Eds., vol. 6172. Edinburgh, UK: Springer- Verlag, Jul 2010, pp. 243-258.
-
(2010)
1st ITP, Ser. LNCS
, vol.6172
, pp. 243-258
-
-
Fox, A.1
Myreen, M.2
-
7
-
-
80051996448
-
The Mälardalen WCET benchmarks-past, present and future
-
Brussels, Belgium: OCG, Jul
-
J. Gustafsson, A. Betts, A. Ermedahl, and B. Lisper, "The Mälardalen WCET benchmarks - past, present and future," in 10th WS Worst-Case Execution-Time Analysis. Brussels, Belgium: OCG, Jul 2010, pp. 137- 147.
-
(2010)
10th WS Worst-Case Execution-Time Analysis
, pp. 137-147
-
-
Gustafsson, J.1
Betts, A.2
Ermedahl, A.3
Lisper, B.4
-
8
-
-
33745469024
-
Why model checking can improve WCET analysis
-
R. Alur and D. Peled, Eds. Springer-Verlag
-
A. Metzner, "Why model checking can improve WCET analysis," in Computer Aided Verification, ser. LNCS, R. Alur and D. Peled, Eds. Springer-Verlag, 2004, vol. 3114, pp. 298-301.
-
(2004)
Computer Aided Verification, Ser. LNCS
, vol.3114
, pp. 298-301
-
-
Metzner, A.1
-
10
-
-
67650563022
-
A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models
-
Washington, DC, USA: IEEE Computer Society
-
P. Lokuciejewski, D. Cordes, H. Falk, and P. Marwedel, "A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models," in 7th IEEE Symp. Code Generation & Optimization. Washington, DC, USA: IEEE Computer Society, 2009, pp. 136-146.
-
(2009)
7th IEEE Symp. Code Generation & Optimization
, pp. 136-146
-
-
Lokuciejewski, P.1
Cordes, D.2
Falk, H.3
Marwedel, P.4
-
11
-
-
78650830260
-
ABC: Algebraic bound computation for loops
-
Berlin, Heidelberg: Springer-Verlag
-
R. Blanc, T. A. Henzinger, T. Hottelier, and L. Kovács, "ABC: algebraic bound computation for loops," in 16th Int. Conf. Logic for Progr., Artificial Intelligence & Reasoning. Berlin, Heidelberg: Springer- Verlag, 2010, pp. 103-118.
-
(2010)
16th Int. Conf. Logic for Progr., Artificial Intelligence & Reasoning
, pp. 103-118
-
-
Blanc, R.1
Henzinger, T.A.2
Hottelier, T.3
Kovács, L.4
-
12
-
-
35148820173
-
Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution
-
Washington, DC, USA: IEEE Computer Society
-
J. Gustafsson, A. Ermedahl, C. Sandberg, and B. Lisper, "Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution," in 27th RTSS. Washington, DC, USA: IEEE Computer Society, 2006, pp. 57-66.
-
(2006)
27th RTSS
, pp. 57-66
-
-
Gustafsson, J.1
Ermedahl, A.2
Sandberg, C.3
Lisper, B.4
-
13
-
-
84858314395
-
R-TuBound: Loop bounds for WCET analysis (tool paper)
-
N. Bjrner and A. Voronkov, Eds. Springer Berlin / Heidelberg
-
J. Knoop, L. Kovàcs, and J. Zwirchmayr, "r-TuBound: Loop bounds for WCET analysis (tool paper)," in Logic for Programming, Artificial Intelligence, and Reasoning, ser. LNCS, N. Bjrner and A. Voronkov, Eds. Springer Berlin / Heidelberg, 2012, vol. 7180, pp. 435-444.
-
(2012)
Logic for Programming, Artificial Intelligence, and Reasoning, Ser. LNCS
, vol.7180
, pp. 435-444
-
-
Knoop, J.1
Kovàcs, L.2
Zwirchmayr, J.3
-
14
-
-
55849127091
-
Using model checking to derive loop bounds of general loops within ANSI-C applications for measurement based WCET analysis
-
Jul
-
B. Rieder, P. Puschner, and I. Wenzel, "Using model checking to derive loop bounds of general loops within ANSI-C applications for measurement based WCET analysis," in Intelligent Solutions in Embedded Systems, 2008 International Workshop on, Jul 2008, pp. 1-7.
-
(2008)
Intelligent Solutions in Embedded Systems, 2008 International Workshop on
, pp. 1-7
-
-
Rieder, B.1
Puschner, P.2
Wenzel, I.3
-
15
-
-
33646066587
-
Finding basic block and variable correspondence
-
Berlin, Heidelberg: Springer-Verlag
-
I. Narasamdya and A. Voronkov, "Finding basic block and variable correspondence," in Proceedings of the 12th international conference on Static Analysis, ser. SAS'05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 251-267.
-
(2005)
Proceedings of the 12th International Conference on Static Analysis, Ser. SAS'05
, pp. 251-267
-
-
Narasamdya, I.1
Voronkov, A.2
-
17
-
-
34547192335
-
Efficient detection and exploitation of infeasible paths for software timing analysis
-
New York, NY, USA: ACM
-
V. Suhendra, T. Mitra, A. Roychoudhury, and T. Chen, "Efficient detection and exploitation of infeasible paths for software timing analysis," in 43rd DAC. New York, NY, USA: ACM, 2006, pp. 358-363.
-
(2006)
43rd DAC
, pp. 358-363
-
-
Suhendra, V.1
Mitra, T.2
Roychoudhury, A.3
Chen, T.4
-
18
-
-
37849024394
-
Detecting large number of infeasible paths through recognizing their patterns
-
New York, NY, USA: ACM
-
M. N. Ngo and H. B. K. Tan, "Detecting large number of infeasible paths through recognizing their patterns," in 6th ESEC. New York, NY, USA: ACM, 2007, pp. 215-224.
-
(2007)
6th ESEC
, pp. 215-224
-
-
Ngo, M.N.1
Tan, H.B.K.2
-
19
-
-
35348951470
-
The software model checker BLAST: Applications to software engineering
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar, "The software model checker BLAST: Applications to software engineering," Int. J. Softw. Tools for Technology Transfer, vol. 9, no. 5, pp. 505-525, 2007.
-
(2007)
Int. J. Softw. Tools for Technology Transfer
, vol.9
, Issue.5
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
20
-
-
77954983679
-
Directed proof generation for machine code
-
A. V. Thakur, J. Lim, A. Lal, A. Burton, E. Driscoll, M. Elder, T. Andersen, and T. W. Reps, "Directed proof generation for machine code," in 22nd CAV, 2010, pp. 288-305.
-
(2010)
22nd CAV
, pp. 288-305
-
-
Thakur, A.V.1
Lim, J.2
Lal, A.3
Burton, A.4
Driscoll, E.5
Elder, M.6
Andersen, T.7
Reps, T.W.8
-
21
-
-
84873432523
-
TRACER: A symbolic execution tool for verification
-
Berlin, Heidelberg: Springer-Verlag
-
J. Jaffar, V. Murali, J. A. Navas, and A. E. Santosa, "TRACER: A symbolic execution tool for verification," in 24th CAV. Berlin, Heidelberg: Springer-Verlag, 2012.
-
(2012)
24th CAV
-
-
Jaffar, J.1
Murali, V.2
Navas, J.A.3
Santosa, A.E.4
-
22
-
-
84859090239
-
The S2E platform: Design, implementation, and applications
-
Feb
-
V. Chipounov, V. Kuznetsov, and G. Candea, "The S2E platform: Design, implementation, and applications," ACM Trans. Comp. Syst., vol. 30, no. 1, pp. 2:1-2:49, Feb 2012.
-
(2012)
ACM Trans. Comp. Syst.
, vol.30
, Issue.1
, pp. 21-249
-
-
Chipounov, V.1
Kuznetsov, V.2
Candea, G.3
-
23
-
-
33745446386
-
Integration of a software model checker into Isabelle
-
Heidelberg: Springer-Verlag
-
M. Daum, S. Maus, N. Schirmer, and M. N. Seghir, "Integration of a software model checker into Isabelle," in 12th Int. Conf. Logic for Progr., Artificial Intelligence & Reasoning. Berlin, Heidelberg: Springer- Verlag, 2005, pp. 381-395.
-
(2005)
12th Int. Conf. Logic for Progr., Artificial Intelligence & Reasoning. Berlin
, pp. 381-395
-
-
Daum, M.1
Maus, S.2
Schirmer, N.3
Seghir, M.N.4
-
24
-
-
48949099057
-
Jakstab: A static analysis platform for binaries
-
Berlin, Heidelberg: Springer-Verlag
-
J. Kinder and H. Veith, "Jakstab: A static analysis platform for binaries," in 20th CAV. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 423-427.
-
(2008)
20th CAV
, pp. 423-427
-
-
Kinder, J.1
Veith, H.2
-
25
-
-
79960357751
-
The BINCOA framework for binary code analysis
-
Berlin, Heidelberg: Springer-Verlag
-
S. Bardin, P. Herrmann, J. Leroux, O. Ly, R. Tabary, and A. Vincent, "The BINCOA framework for binary code analysis," in 23rd CAV. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 165-170.
-
(2011)
23rd CAV
, pp. 165-170
-
-
Bardin, S.1
Herrmann, P.2
Leroux, J.3
Ly, O.4
Tabary, R.5
Vincent, A.6
-
26
-
-
80455129085
-
ARMor: Fully verified software fault isolation
-
New York, NY, USA: ACM
-
L. Zhao, G. Li, B. De Sutter, and J. Regehr, "ARMor: fully verified software fault isolation," in 11th EMSOFT. New York, NY, USA: ACM, 2011, pp. 289-298.
-
(2011)
11th EMSOFT
, pp. 289-298
-
-
Zhao, L.1
Li, G.2
De Sutter, B.3
Regehr, J.4
-
27
-
-
58449105414
-
An abstract interpretation-based framework for control flow reconstruction from binaries
-
Berlin, Heidelberg: Springer-Verlag
-
J. Kinder, F. Zuleger, and H. Veith, "An abstract interpretation-based framework for control flow reconstruction from binaries," in 10th Int. Conf. Verification, Model Checking & Abstract Interpretation. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 214-228.
-
(2009)
10th Int. Conf. Verification, Model Checking & Abstract Interpretation
, pp. 214-228
-
-
Kinder, J.1
Zuleger, F.2
Veith, H.3
-
28
-
-
79251584631
-
Refinement-based CFG reconstruction from unstructured programs
-
Berlin, Heidelberg: Springer-Verlag
-
S. Bardin, P. Herrmann, and F. Védrine, "Refinement-based CFG reconstruction from unstructured programs," in 12th Int. Conf. Verification, Model Checking & Abstract Interpretation. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 54-69.
-
(2011)
12th Int. Conf. Verification, Model Checking & Abstract Interpretation
, pp. 54-69
-
-
Bardin, S.1
Herrmann, P.2
Védrine, F.3
-
29
-
-
0016309945
-
Testing flow graph reducibility
-
R. E. Tarjan, "Testing flow graph reducibility," J. Comp. & Syst. Sci., vol. 9, no. 3, pp. 355-365, 1974.
-
(1974)
J. Comp. & Syst. Sci.
, vol.9
, Issue.3
, pp. 355-365
-
-
Tarjan, R.E.1
-
30
-
-
0031186224
-
Nesting of reducible and irreducible loops
-
Jul
-
P. Havlak, "Nesting of reducible and irreducible loops," ACM Trans. Progr. Lang. & Syst., vol. 19, no. 4, pp. 557-567, Jul 1997.
-
(1997)
ACM Trans. Progr. Lang. & Syst.
, vol.19
, Issue.4
, pp. 557-567
-
-
Havlak, P.1
-
31
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
October
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck, "Efficiently computing static single assignment form and the control dependence graph," ACM Trans. Progr. Lang. & Syst., vol. 13, pp. 451- 490, October 1991.
-
(1991)
ACM Trans. Progr. Lang. & Syst.
, vol.13
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
32
-
-
0021457061
-
Program slicing
-
Jul
-
M. Weiser, "Program slicing," IEEE Trans. Softw. Engin., vol. SE-10, no. 4, pp. 352-357, Jul 1984.
-
(1984)
IEEE Trans. Softw. Engin.
, vol.SE-10
, Issue.4
, pp. 352-357
-
-
Weiser, M.1
-
33
-
-
84865598277
-
Directions in ISA specification
-
Princeton, New Jersey: Springer-Verlag, Aug
-
A. Fox, "Directions in ISA specification," in 3rd ITP, ser. LNCS. Princeton, New Jersey: Springer-Verlag, Aug 2012.
-
(2012)
3rd ITP, Ser. LNCS
-
-
Fox, A.1
|