MemSafe: ensuring the spatial and temporal memory safety of C at runtime

MS Simpson, RK Barua - Software: Practice and Experience, 2013 - Wiley Online Library
Memory access violations are a leading source of unreliability in C programs. As evidence of
this problem, a variety of methods exist that retrofit C with software checks to detect memory …

Efficient memory safety for TinyOS

N Cooprider, W Archer, E Eide, D Gay… - Proceedings of the 5th …, 2007 - dl.acm.org
Reliable sensor network software is difficult to create: applications are concurrent and
distributed, hardware-based memory protection is unavailable, and severe resource …

Towards the security of motion detection-based video surveillance on IoT devices

X Feng, M Ye, V Swaminathan, S Wei - … of the on Thematic Workshops of …, 2017 - dl.acm.org
Video surveillance enabled by Internet of Things (IoT) devices, such as smart cameras, has
become a popular set of applications recently with the trend of adopting IoT in multimedia …

Memory overflow protection for embedded systems using run-time checks, reuse, and compression

S Biswas, T Carley, M Simpson, B Middha… - ACM Transactions on …, 2006 - dl.acm.org
Embedded systems usually lack virtual memory and are vulnerable to memory overflow
since they lack a mechanism to detect overflow or use swap space thereafter. We present a …

Reliability Analysis of the Reconfigurable Integrated Modular Avionics Using the Continuous‐Time Markov Chains

C Zhao, P Wang, F Yan - International Journal of Aerospace …, 2018 - Wiley Online Library
The integrated modular avionics (IMA) has been widely deployed on the new designed
aircraft to replace the traditional federated avionics. Hosted in different partitions which are …

System, method and computer-accessible medium for low-overhead security wrapper for memory access control of embedded systems

R Karri, J Backer, D Hely - US Patent 10,289,577, 2019 - Google Patents
An exemplary system for wrapping an intellectual property core (IP) bus master (s), can
include, for example, a plurality of IP cores associated with the IP core bus master (s), and a …

Memory protection in embedded systems

L Lopriore - Journal of Systems Architecture, 2016 - Elsevier
With reference to an embedded system featuring no support for memory management, we
present a model of a protection system based on passwords. At the hardware level, our …

Reliability of software applications in integrated modular avionics

I Kabashkin, V Filippov - Transportation Research Procedia, 2020 - Elsevier
The integrated modular avionics (IMA) network consists of a number of computing modules
capable of supporting numerous applications of differing critical and non-critical levels. In …

MEMMU: Memory expansion for MMU-less embedded systems

LS Bai, L Yang, RP Dick - ACM Transactions on Embedded Computing …, 2009 - dl.acm.org
Random access memory (RAM) is tightly constrained in the least expensive, lowest-power
embedded systems such as sensor network nodes and portable consumer electronics. The …

[图书][B] Memory Protection at Option-Application-Tailored Memory Safety in Safety-Critical Embedded Systems

M Stilkerich - 2012 - search.proquest.com
With the increasing capabilities and resources available on microcontrollers, there is a trend
in the embedded industry to integrate multiple software functions on a single system to save …