[HTML][HTML] A framework for static analysis and verification of low-level RTOS code
V Manjunath, M Baunach - Journal of Systems Architecture, 2024 - Elsevier
Modern embedded software development uses model-based methods to support long-term
maintenance, portability, and correctness. A growing trend is to use formal methods to create …
maintenance, portability, and correctness. A growing trend is to use formal methods to create …
JTR: A Binary Solution for Switch-Case Recovery
Most security solutions that rely on binary rewriting assume a clean separation between
code and data. Unfortunately, jump tables violate this assumption. In particular, switch …
code and data. Unfortunately, jump tables violate this assumption. In particular, switch …
Program analysis as model checking
MC Olesen - 2014 - vbn.aau.dk
Software programs are proliferating throughout modern life, to a point where even the
simplest appliances such as lightbulbs contain software, in addition to the software …
simplest appliances such as lightbulbs contain software, in addition to the software …
[PDF][PDF] Between a hard and soft place: The (in) secure interplay of hardware and software
L Cojocar - 2019 - research.vu.nl
Embedded devices are ubiquitous. For example, an average household has at least a
couple of dozen of so-called smart systems. You can find these systems in your …
couple of dozen of so-called smart systems. You can find these systems in your …
Energiautomater, energifunktioner og Kleene-algebra
U Fahrenberg, KG Larsen - Norsk IKT-konferanse for forskning og …, 2018 - ntnu.no
Forfatterne til denne artikel har, sammen med mange gode kolleger, i en del år arbejdet med
såkaldte energiproblemer. Disse handler om, at man i en formel model ønsker at bestemme …
såkaldte energiproblemer. Disse handler om, at man i en formel model ønsker at bestemme …
A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain
With the proliferation of smart mobiles, disassembly techniques for position-independent
code (PIC) composed of ARM architecture instructions in computer security are becoming …
code (PIC) composed of ARM architecture instructions in computer security are becoming …
Analysis and Verification of Cyber-Physical System Software Using Static Analysis
Z Zhang - 2015 - ir.vanderbilt.edu
Cyber-Physical Systems (CPS) are complex systems which involve tight interactions
between physical dynamics, computational platforms, communication networks, and …
between physical dynamics, computational platforms, communication networks, and …
[PDF][PDF] Generic Value-Set Analysis on Low-Level Code
ZZX Koutsoukos - isis.vanderbilt.edu
Verification is an essential task in the design of cyberphysical systems (CPS). Due to the
lack of many details captured at a high-level like compilation and computational platform …
lack of many details captured at a high-level like compilation and computational platform …
[PDF][PDF] Automatic abstraction for bit-vectors using decision procedures
J Brauer - 2013 - aib.informatik.rwth-aachen.de
This dissertation is concerned with abstract interpretation of programs whose semantics is
defined over finite machine words. Most notably, the considered class of programs contains …
defined over finite machine words. Most notably, the considered class of programs contains …