-
2
-
-
78349246158
-
-
MCAR/, Apr
-
James Barhorst, Todd Belote, Pam Binns, Jon Hoffman, James Paunicka, Prakash Sarathy, John Scoredos, Peter Stanfill, Douglas Stuart, and Russell Urzi. A research agenda for mixed-criticality systems. Available at http://www.cse.wustl.edu/-cdgill/CPSWEEK09 MCAR/, Apr 2009.
-
(2009)
A Research Agenda for Mixed-criticality Systems
-
-
Barhorst, J.1
Belote, T.2
Binns, P.3
Hoffman, J.4
Paunicka, J.5
Sarathy, P.6
Scoredos, J.7
Stanfill, P.8
Stuart, D.9
Urzi, R.10
-
3
-
-
0007986382
-
Shapiro. the KeyKOS nanokernel architecture
-
Seattle, WA, US, Apr
-
Alan C. Bromberger, A. Peri Frantz, William S. Frantz, Ann C. Hardy, Norman Hardy, Charles R. Landau, and Jonathan S. Shapiro. The KeyKOS nanokernel architecture. In USENIX WS Microkernels & other Kernel Arch., pages 95-112, Seattle, WA, US, Apr 1992.
-
(1992)
USENIX WS Microkernels & Other Kernel Arch
, pp. 95-112
-
-
Bromberger, A.C.1
Peri Frantz, A.2
Frantz, W.S.3
Hardy, A.C.4
Hardy, N.5
Landau, C.R.6
Jonathan, S.7
-
4
-
-
84881105004
-
Sequoll: A framework for model checking binaries
-
Philadelphia, USA, Apr
-
Bernard Blackham and Gernot Heiser. Sequoll: a framework for model checking binaries. In RTAS, pages 97-106, Philadelphia, USA, Apr 2013.
-
(2013)
RTAS
, pp. 97-106
-
-
Blackham, B.1
Heiser, G.2
-
5
-
-
78650830260
-
ABC: Algebraic bound computation for loops
-
Régis Blanc, Thomas A. Henzinger, Thibaud Hottelier, and Laura Kovács. ABC: algebraic bound computation for loops. In 16th Int. Conf. Logic for Progr., Artificial Intelligence & Reasoning, pages 103-118, 2010.
-
(2010)
16th Int. Conf. Logic for Progr., Artificial Intelligence & Reasoning
, pp. 103-118
-
-
Blanc, R.1
Henzinger, T.A.2
Hottelier, T.3
Kovács, L.4
-
6
-
-
79251584631
-
Refinement-based CFG reconstruction from unstructured programs
-
Sébastien Bardin, Philippe Herrmann, and Franck Védrine. Refinement-based CFG reconstruction from unstructured programs. In Int. Conf. Verification, Model Checking & Abstract Interpretation, pages 54-69, 2011.
-
(2011)
Int. Conf. Verification, Model Checking & Abstract Interpretation
, pp. 54-69
-
-
Bardin, S.1
Herrmann, P.2
Védrine, F.3
-
7
-
-
84926672365
-
Trickle: Automated infeasible path detection using all minimal unsatisfiable subsets
-
Berlin, Germany, Apr
-
Bernard Blackham, Mark Liffiton, and Gernot Heiser. Trickle: automated infeasible path detection using all minimal unsatisfiable subsets. In RTAS, pages 169-178, Berlin, Germany, Apr 2014.
-
(2014)
RTAS
, pp. 169-178
-
-
Blackham, B.1
Liffiton, M.2
Heiser, G.3
-
8
-
-
84856547218
-
Timing analysis of a protected operating system kernel
-
Vienna, Austria, Nov
-
Bernard Blackham, Yao Shi, Sudipta Chattopadhyay, Abhik Roychoudhury, and Gernot Heiser. Timing analysis of a protected operating system kernel. In RTSS, pages 339-348, Vienna, Austria, Nov 2011.
-
(2011)
RTSS
, pp. 339-348
-
-
Blackham, B.1
Shi, Y.2
Chattopadhyay, S.3
Roychoudhury, A.4
Heiser, G.5
-
9
-
-
84860586287
-
Improving interrupt response time in a verifiable protected microkernel
-
Bern, Switzerland, Apr
-
Bernard Blackham, Yao Shi, and Gernot Heiser. Improving interrupt response time in a verifiable protected microkernel. In EuroSys, pages 323-336, Bern, Switzerland, Apr 2012.
-
(2012)
EuroSys
, pp. 323-336
-
-
Blackham, B.1
Shi, Y.2
Heiser, G.3
-
11
-
-
84864257990
-
Understanding integer overflow in C/C++
-
Piscataway, NJ, USA
-
Will Dietz, Peng Li, John Regehr, and Vikram Adve. Understanding integer overflow in C/C++. In Proceedings of the 34th International Conference on Software Engineering, ICSE '12, pages 760-770, Piscataway, NJ, USA, 2012.
-
(2012)
Proceedings of the 34th International Conference on Software Engineering, ICSE '12
, pp. 760-770
-
-
Dietz, W.1
Li, P.2
Regehr, J.3
Adve, V.4
-
12
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Jack B. Dennis and Earl C. Van Horn. Programming semantics for multiprogrammed computations. CACM, 9:143-155, 1966.
-
(1966)
CACM
, vol.9
, pp. 143-155
-
-
Dennis, J.B.1
Horn Van, E.C.2
-
13
-
-
84889642537
-
From L3 to seL4 - What have we learnt in 20 years of L4 microkernels?
-
Farmington, PA, USA, Nov
-
Kevin Elphinstone and Gernot Heiser. From L3 to seL4 - what have we learnt in 20 years of L4 microkernels? In SOSP, pages 133-150, Farmington, PA, USA, Nov 2013.
-
(2013)
SOSP
, pp. 133-150
-
-
Elphinstone, K.1
Heiser, G.2
-
14
-
-
84947261898
-
Reliable and precise WCET determination for a real-life processor
-
London, UK
-
Christian Ferdinand, Reinhold Heckmann, Marc Langenbach, Florian Martin, Michael Schmidt, Henrik Theiling, Stephan Thesing, and Reinhard Wilhelm. Reliable and precise WCET determination for a real-life processor. In EMSOFT, pages 469-485, London, UK, 2001.
-
(2001)
EMSOFT
, pp. 469-485
-
-
Ferdinand, C.1
Heckmann, R.2
Langenbach, M.3
Martin, F.4
Schmidt, M.5
Theiling, H.6
Thesing, S.7
Wilhelm, R.8
-
15
-
-
77955256819
-
A trustworthy monadic formalization of the ARMv7 instruction set architecture
-
Edinburgh, UK, Jul
-
Anthony Fox and Magnus Myreen. A trustworthy monadic formalization of the ARMv7 instruction set architecture. In 1st ITP, volume 6172 of LNCS, pages 243-258, Edinburgh, UK, Jul 2010.
-
(2010)
1st ITP, Volume 6172 of LNCS
, pp. 243-258
-
-
Fox, A.1
Myreen, M.2
-
16
-
-
80051996448
-
The Mälardalen WCET benchmarks - Past, present and future
-
Brussels, BE, Jul
-
Jan Gustafsson, Adam Betts, Andreas Ermedahl, and Björn Lisper. The Mälardalen WCET benchmarks - past, present and future. In 10th WS Worst-Case Execution-Time Analysis, pages 137-147, Brussels, BE, Jul 2010.
-
(2010)
10th WS Worst-Case Execution-Time Analysis
, pp. 137-147
-
-
Gustafsson, J.1
Betts, A.2
Ermedahl, A.3
Lisper, B.4
-
17
-
-
35148820173
-
Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution
-
Washington, DC, US
-
Jan Gustafsson, Andreas Ermedahl, Christer Sandberg, and Björn Lisper. Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution. In RTSS, pages 57-66, Washington, DC, US, 2006.
-
(2006)
RTSS
, pp. 57-66
-
-
Gustafsson, J.1
Ermedahl, A.2
Sandberg, C.3
Lisper, B.4
-
18
-
-
84862134556
-
Operating systems technology for converged ECUs
-
Hamburg, Germany, Nov
-
Andr Hergenhan and Gernot Heiser. Operating systems technology for converged ECUs. In 6th Emb. Security in Cars Conf. (escar), page 3 pages, Hamburg, Germany, Nov 2008.
-
(2008)
6th Emb. Security in Cars Conf. (Escar)
, pp. 3
-
-
Hergenhan, A.1
Heiser, G.2
-
20
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Big Sky, MT, US, Oct
-
Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, et al. seL4: Formal verification of an OS kernel. In SOSP, pages 207-220, Big Sky, MT, US, Oct 2009.
-
(2009)
SOSP
, pp. 207-220
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
-
22
-
-
84893457364
-
Wcet squeezing: On-demand feasibility refinement for proven precise wcet-bounds
-
New York, NY, USA
-
Jens Knoop, Laura Kovács, and Jakob Zwirchmayr. Wcet squeezing: On-demand feasibility refinement for proven precise wcet-bounds. In Proceedings of the 21st International Conference on Real-Time Networks and Systems, RTNS '13, pages 161-170, New York, NY, USA, 2013.
-
(2013)
Proceedings of the 21st International Conference on Real-Time Networks and Systems, RTNS '13
, pp. 161-170
-
-
Knoop, J.1
Kovács, L.2
Zwirchmayr, J.3
-
23
-
-
58449105414
-
An abstract interpretation-based framework for control flow reconstruction from binaries
-
Johannes Kinder, Florian Zuleger, and Helmut Veith. An abstract interpretation-based framework for control flow reconstruction from binaries. In 10th Int. Conf. Verification, Model Checking & Abstract Interpretation, pages 214-228, 2009.
-
(2009)
10th Int. Conf. Verification, Model Checking & Abstract Interpretation
, pp. 214-228
-
-
Kinder, J.1
Zuleger, F.2
Veith, H.3
-
24
-
-
67650563022
-
A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models
-
Washington, DC, US
-
Paul Lokuciejewski, Daniel Cordes, Heiko Falk, and Peter Marwedel. A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models. In 7th Symp. Code Generation & Optimization, pages 136-146, Washington, DC, US, 2009.
-
(2009)
7th Symp. Code Generation & Optimization
, pp. 136-146
-
-
Lokuciejewski, P.1
Cordes, D.2
Falk, H.3
Marwedel, P.4
-
25
-
-
67650088351
-
Formal verification of a realistic compiler
-
Xavier Leroy. Formal verification of a realistic compiler. CACM, 52(7):107-115, 2009.
-
(2009)
CACM
, vol.52
, Issue.7
, pp. 107-115
-
-
Leroy, X.1
-
26
-
-
84966388028
-
Mixed-criticality support in a high-assurance, general-purpose microkernel
-
Rome, Italy, Dec
-
Anna Lyons and Gernot Heiser. Mixed-criticality support in a high-assurance, general-purpose microkernel. In WS Mixed Criticality Syst., pages 9-14, Rome, Italy, Dec 2014.
-
(2014)
WS Mixed Criticality Syst
, pp. 9-14
-
-
Lyons, A.1
Heiser, G.2
-
28
-
-
36048974180
-
Chronos: A timing analyzer for embedded software
-
Dec
-
Xianfeng Li, Yun Liang, Tulika Mitra, Abhik Roychoudhury. Chronos: A timing analyzer for embedded software. Science of Computer Programming Special issue on Experimental Software and Toolkit 69(1-3): 56-67, Dec 2007.
-
(2007)
Science of Computer Programming Special Issue on Experimental Software and Toolkit
, vol.69
, Issue.1-3
, pp. 56-67
-
-
Li, X.1
Liang, Y.2
Mitra, T.3
Roychoudhury, A.4
-
29
-
-
84881233720
-
SeL4: From general purpose to a proof of information flow enforcement
-
San Francisco, CA, May
-
Toby Murray, Daniel Matichuk, Matthew Brassil, Peter Gammie, Timothy Bourke, Sean Seefried, Corey Lewis, Xin Gao, and Gerwin Klein. seL4: from general purpose to a proof of information flow enforcement. In S&P, pages 415-429, San Francisco, CA, May 2013.
-
(2013)
S&P
, pp. 415-429
-
-
Murray, T.1
Matichuk, D.2
Brassil, M.3
Gammie, P.4
Bourke, T.5
Seefried, S.6
Lewis, C.7
Gao, X.8
Klein, G.9
-
30
-
-
34848851727
-
-
US National Institute of Standards., ISO Standard 15408
-
US National Institute of Standards. Common Criteria for IT Security Evaluation, 1999. ISO Standard 15408. http://csrc.nist.gov/cc/.
-
(1999)
Common Criteria for IT Security Evaluation
-
-
-
32
-
-
55849127091
-
Using model checking to derive loop bounds of general loops within ANSI-C applications for measurement based WCET analysis
-
Jul
-
Bernhard Rieder, Peter Puschner, and Ingomar Wenzel. Using model checking to derive loop bounds of general loops within ANSI-C applications for measurement based WCET analysis. In Intelligent Solutions in Embedded Systems, 2008 International Workshop on, pages 1-7, Jul 2008.
-
(2008)
Intelligent Solutions in Embedded Systems, 2008 International Workshop on
, pp. 1-7
-
-
Rieder, B.1
Puschner, P.2
Wenzel, I.3
-
35
-
-
84888186480
-
Code optimizations using formally verified properties
-
Indianapolis, USA, Oct
-
Yao Shi, Bernard Blackham, and Gernot Heiser. Code optimizations using formally verified properties. In OOPSLA, pages 427-442, Indianapolis, USA, Oct 2013.
-
(2013)
OOPSLA
, pp. 427-442
-
-
Shi, Y.1
Blackham, B.2
Heiser, G.3
-
36
-
-
84880098512
-
Translation validation for a verified OS kernel
-
Seattle, Washington, USA, Jun
-
Thomas Sewell, Magnus Myreen, and Gerwin Klein. Translation validation for a verified OS kernel. In PLDI, pages 471-481, Seattle, Washington, USA, Jun 2013.
-
(2013)
PLDI
, pp. 471-481
-
-
Sewell, T.1
Myreen, M.2
Klein, G.3
-
37
-
-
57049085253
-
A brief overview of HOL4
-
Montral, Canada, Aug
-
Konrad Slind and Michael Norrish. A brief overview of HOL4. In TPHOLs, pages 28-32, Montral, Canada, Aug 2008.
-
(2008)
TPHOLs
, pp. 28-32
-
-
Slind, K.1
Norrish, M.2
-
38
-
-
80052184715
-
SeL4 enforces integrity
-
Nijmegen, The Netherlands, Aug
-
Thomas Sewell, Simon Winwood, Peter Gammie, Toby Murray, June Andronick, and Gerwin Klein. seL4 enforces integrity. In ITP, pages 325-340, Nijmegen, The Netherlands, Aug 2011.
-
(2011)
ITP
, pp. 325-340
-
-
Sewell, T.1
Winwood, S.2
Gammie, P.3
Murray, T.4
Andronick, J.5
Klein, G.6
-
39
-
-
33846519994
-
Types, bytes, and separation logic
-
Nice, France, Jan
-
Harvey Tuch, Gerwin Klein, and Michael Norrish. Types, bytes, and separation logic. In POPL, pages 97-108, Nice, France, Jan 2007.
-
(2007)
POPL
, pp. 97-108
-
-
Tuch, H.1
Klein, G.2
Norrish, M.3
-
40
-
-
43949126892
-
The worst-case execution-time problem-overview of methods and survey of tools
-
Reinhard Wilhelm, Jakob Engblom, Andreas Ermedahl, Niklas Holsti, Stephan Thesing, David Whalley, Guillem Bernat, Christian Ferdinand, Reinhold Heckmann, Tulika Mitra, Frank Mueller, Isabelle Puaut, Peter Puschner, Jan Staschulat, and Per Stenström. The worst-case execution-time problem-overview of methods and survey of tools. Trans. Emb. Comput. Syst., 7(3):1-53, 2008.
-
(2008)
Trans. Emb. Comput. Syst
, vol.7
, Issue.3
, pp. 1-53
-
-
Wilhelm, R.1
Engblom, J.2
Ermedahl, A.3
Holsti, N.4
Thesing, S.5
Whalley, D.6
Bernat, G.7
Ferdinand, C.8
Heckmann, R.9
Mitra, T.10
Mueller, F.11
Puaut, I.12
Puschner, P.13
Staschulat, J.14
Stenström, P.15
|