메뉴 건너뛰기




Volumn , Issue , 2013, Pages 97-106

Sequoll: A framework for model checking binaries

Author keywords

Operating system kernels; Real time systems; Software verification and validation

Indexed keywords

ERROR PRONES; INFEASIBLE PATHS; INTERRUPT LATENCY; MULTI-CRITICALITY; OPERATING SYSTEM KERNEL; SOFTWARE VERIFICATION AND VALIDATION; WCET ANALYSIS;

EID: 84881105004     PISSN: 10801812     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RTAS.2013.6531083     Document Type: Conference Paper
Times cited : (9)

References (33)
  • 1
    • 84881109329 scopus 로고    scopus 로고
    • Avionics Application Software Standard Interface, Nov 2012, ARINC Standard 653
    • Avionics Application Software Standard Interface, Nov 2012, ARINC Standard 653.
  • 2
    • 84862134556 scopus 로고    scopus 로고
    • Operating systems technology for converged ECUs
    • Hamburg, Germany: ISITS, Nov
    • A. Hergenhan and G. Heiser, "Operating systems technology for converged ECUs," in 6th Emb. Security in Cars Conf. (escar). Hamburg, Germany: ISITS, Nov 2008.
    • (2008) 6th Emb. Security in Cars Conf. (Escar)
    • Hergenhan, A.1    Heiser, G.2
  • 4
    • 84856547218 scopus 로고    scopus 로고
    • Timing analysis of a protected operating system kernel
    • Vienna, Austria, Nov
    • B. Blackham, Y. Shi, S. Chattopadhyay, A. Roychoudhury, and G. Heiser, "Timing analysis of a protected operating system kernel," in 32nd RTSS, Vienna, Austria, Nov 2011, pp. 339-348.
    • (2011) 32nd RTSS , pp. 339-348
    • Blackham, B.1    Shi, Y.2    Chattopadhyay, S.3    Roychoudhury, A.4    Heiser, G.5
  • 5
    • 84860586287 scopus 로고    scopus 로고
    • Improving interrupt response time in a verifiable protected microkernel
    • Bern, Switzerland, Apr
    • B. Blackham, Y. Shi, and G. Heiser, "Improving interrupt response time in a verifiable protected microkernel," in 7th EuroSys Conf., Bern, Switzerland, Apr 2012, pp. 323-336.
    • (2012) 7th EuroSys Conf. , pp. 323-336
    • Blackham, B.1    Shi, Y.2    Heiser, G.3
  • 6
    • 77955256819 scopus 로고    scopus 로고
    • A trustworthy monadic formalization of the ARMv7 instruction set architecture
    • M. Kaufmann and L. C. Paulson, Eds. Edinburgh, UK: Springer-Verlag, Jul
    • A. Fox and M. Myreen, "A trustworthy monadic formalization of the ARMv7 instruction set architecture," in 1st ITP, ser. LNCS, M. Kaufmann and L. C. Paulson, Eds., vol. 6172. Edinburgh, UK: Springer- Verlag, Jul 2010, pp. 243-258.
    • (2010) 1st ITP, Ser. LNCS , vol.6172 , pp. 243-258
    • Fox, A.1    Myreen, M.2
  • 8
    • 33745469024 scopus 로고    scopus 로고
    • Why model checking can improve WCET analysis
    • R. Alur and D. Peled, Eds. Springer-Verlag
    • A. Metzner, "Why model checking can improve WCET analysis," in Computer Aided Verification, ser. LNCS, R. Alur and D. Peled, Eds. Springer-Verlag, 2004, vol. 3114, pp. 298-301.
    • (2004) Computer Aided Verification, Ser. LNCS , vol.3114 , pp. 298-301
    • Metzner, A.1
  • 10
    • 67650563022 scopus 로고    scopus 로고
    • A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models
    • Washington, DC, USA: IEEE Computer Society
    • P. Lokuciejewski, D. Cordes, H. Falk, and P. Marwedel, "A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models," in 7th IEEE Symp. Code Generation & Optimization. Washington, DC, USA: IEEE Computer Society, 2009, pp. 136-146.
    • (2009) 7th IEEE Symp. Code Generation & Optimization , pp. 136-146
    • Lokuciejewski, P.1    Cordes, D.2    Falk, H.3    Marwedel, P.4
  • 12
    • 35148820173 scopus 로고    scopus 로고
    • Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution
    • Washington, DC, USA: IEEE Computer Society
    • J. Gustafsson, A. Ermedahl, C. Sandberg, and B. Lisper, "Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution," in 27th RTSS. Washington, DC, USA: IEEE Computer Society, 2006, pp. 57-66.
    • (2006) 27th RTSS , pp. 57-66
    • Gustafsson, J.1    Ermedahl, A.2    Sandberg, C.3    Lisper, B.4
  • 13
    • 84858314395 scopus 로고    scopus 로고
    • R-TuBound: Loop bounds for WCET analysis (tool paper)
    • N. Bjrner and A. Voronkov, Eds. Springer Berlin / Heidelberg
    • J. Knoop, L. Kovàcs, and J. Zwirchmayr, "r-TuBound: Loop bounds for WCET analysis (tool paper)," in Logic for Programming, Artificial Intelligence, and Reasoning, ser. LNCS, N. Bjrner and A. Voronkov, Eds. Springer Berlin / Heidelberg, 2012, vol. 7180, pp. 435-444.
    • (2012) Logic for Programming, Artificial Intelligence, and Reasoning, Ser. LNCS , vol.7180 , pp. 435-444
    • Knoop, J.1    Kovàcs, L.2    Zwirchmayr, J.3
  • 14
  • 17
    • 34547192335 scopus 로고    scopus 로고
    • Efficient detection and exploitation of infeasible paths for software timing analysis
    • New York, NY, USA: ACM
    • V. Suhendra, T. Mitra, A. Roychoudhury, and T. Chen, "Efficient detection and exploitation of infeasible paths for software timing analysis," in 43rd DAC. New York, NY, USA: ACM, 2006, pp. 358-363.
    • (2006) 43rd DAC , pp. 358-363
    • Suhendra, V.1    Mitra, T.2    Roychoudhury, A.3    Chen, T.4
  • 18
    • 37849024394 scopus 로고    scopus 로고
    • Detecting large number of infeasible paths through recognizing their patterns
    • New York, NY, USA: ACM
    • M. N. Ngo and H. B. K. Tan, "Detecting large number of infeasible paths through recognizing their patterns," in 6th ESEC. New York, NY, USA: ACM, 2007, pp. 215-224.
    • (2007) 6th ESEC , pp. 215-224
    • Ngo, M.N.1    Tan, H.B.K.2
  • 21
    • 84873432523 scopus 로고    scopus 로고
    • TRACER: A symbolic execution tool for verification
    • Berlin, Heidelberg: Springer-Verlag
    • J. Jaffar, V. Murali, J. A. Navas, and A. E. Santosa, "TRACER: A symbolic execution tool for verification," in 24th CAV. Berlin, Heidelberg: Springer-Verlag, 2012.
    • (2012) 24th CAV
    • Jaffar, J.1    Murali, V.2    Navas, J.A.3    Santosa, A.E.4
  • 22
    • 84859090239 scopus 로고    scopus 로고
    • The S2E platform: Design, implementation, and applications
    • Feb
    • V. Chipounov, V. Kuznetsov, and G. Candea, "The S2E platform: Design, implementation, and applications," ACM Trans. Comp. Syst., vol. 30, no. 1, pp. 2:1-2:49, Feb 2012.
    • (2012) ACM Trans. Comp. Syst. , vol.30 , Issue.1 , pp. 21-249
    • Chipounov, V.1    Kuznetsov, V.2    Candea, G.3
  • 24
    • 48949099057 scopus 로고    scopus 로고
    • Jakstab: A static analysis platform for binaries
    • Berlin, Heidelberg: Springer-Verlag
    • J. Kinder and H. Veith, "Jakstab: A static analysis platform for binaries," in 20th CAV. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 423-427.
    • (2008) 20th CAV , pp. 423-427
    • Kinder, J.1    Veith, H.2
  • 25
    • 79960357751 scopus 로고    scopus 로고
    • The BINCOA framework for binary code analysis
    • Berlin, Heidelberg: Springer-Verlag
    • S. Bardin, P. Herrmann, J. Leroux, O. Ly, R. Tabary, and A. Vincent, "The BINCOA framework for binary code analysis," in 23rd CAV. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 165-170.
    • (2011) 23rd CAV , pp. 165-170
    • Bardin, S.1    Herrmann, P.2    Leroux, J.3    Ly, O.4    Tabary, R.5    Vincent, A.6
  • 26
    • 80455129085 scopus 로고    scopus 로고
    • ARMor: Fully verified software fault isolation
    • New York, NY, USA: ACM
    • L. Zhao, G. Li, B. De Sutter, and J. Regehr, "ARMor: fully verified software fault isolation," in 11th EMSOFT. New York, NY, USA: ACM, 2011, pp. 289-298.
    • (2011) 11th EMSOFT , pp. 289-298
    • Zhao, L.1    Li, G.2    De Sutter, B.3    Regehr, J.4
  • 27
    • 58449105414 scopus 로고    scopus 로고
    • An abstract interpretation-based framework for control flow reconstruction from binaries
    • Berlin, Heidelberg: Springer-Verlag
    • J. Kinder, F. Zuleger, and H. Veith, "An abstract interpretation-based framework for control flow reconstruction from binaries," in 10th Int. Conf. Verification, Model Checking & Abstract Interpretation. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 214-228.
    • (2009) 10th Int. Conf. Verification, Model Checking & Abstract Interpretation , pp. 214-228
    • Kinder, J.1    Zuleger, F.2    Veith, H.3
  • 29
    • 0016309945 scopus 로고
    • Testing flow graph reducibility
    • R. E. Tarjan, "Testing flow graph reducibility," J. Comp. & Syst. Sci., vol. 9, no. 3, pp. 355-365, 1974.
    • (1974) J. Comp. & Syst. Sci. , vol.9 , Issue.3 , pp. 355-365
    • Tarjan, R.E.1
  • 30
    • 0031186224 scopus 로고    scopus 로고
    • Nesting of reducible and irreducible loops
    • Jul
    • P. Havlak, "Nesting of reducible and irreducible loops," ACM Trans. Progr. Lang. & Syst., vol. 19, no. 4, pp. 557-567, Jul 1997.
    • (1997) ACM Trans. Progr. Lang. & Syst. , vol.19 , Issue.4 , pp. 557-567
    • Havlak, P.1
  • 31
    • 0026243790 scopus 로고
    • Efficiently computing static single assignment form and the control dependence graph
    • October
    • R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck, "Efficiently computing static single assignment form and the control dependence graph," ACM Trans. Progr. Lang. & Syst., vol. 13, pp. 451- 490, October 1991.
    • (1991) ACM Trans. Progr. Lang. & Syst. , vol.13 , pp. 451-490
    • Cytron, R.1    Ferrante, J.2    Rosen, B.K.3    Wegman, M.N.4    Zadeck, F.K.5
  • 32
    • 0021457061 scopus 로고
    • Program slicing
    • Jul
    • M. Weiser, "Program slicing," IEEE Trans. Softw. Engin., vol. SE-10, no. 4, pp. 352-357, Jul 1984.
    • (1984) IEEE Trans. Softw. Engin. , vol.SE-10 , Issue.4 , pp. 352-357
    • Weiser, M.1
  • 33
    • 84865598277 scopus 로고    scopus 로고
    • Directions in ISA specification
    • Princeton, New Jersey: Springer-Verlag, Aug
    • A. Fox, "Directions in ISA specification," in 3rd ITP, ser. LNCS. Princeton, New Jersey: Springer-Verlag, Aug 2012.
    • (2012) 3rd ITP, Ser. LNCS
    • Fox, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.