A survey of architectural approaches for data compression in cache and main memory systems

S Mittal, JS Vetter - IEEE Transactions on Parallel and …, 2015 - ieeexplore.ieee.org
As the number of cores on a chip increases and key applications become even more data-
intensive, memory systems in modern processors have to deal with increasingly large …

[图书][B] Handbook of real-time and embedded systems

I Lee, JYT Leung, SH Son - 2007 - books.google.com
Real-time and embedded systems are essential to our lives, from controlling car engines
and regulating traffic lights to monitoring plane takeoffs and landings to providing up-to-the …

MemSafe: ensuring the spatial and temporal memory safety of C at runtime

MS Simpson, RK Barua - Software: Practice and Experience, 2013 - Wiley Online Library
Memory access violations are a leading source of unreliability in C programs. As evidence of
this problem, a variety of methods exist that retrofit C with software checks to detect memory …

Secure industrial Internet of Things critical infrastructure node design

JM Mcginthy, AJ Michaels - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Integration of industrial Internet of Things (IIoT) into critical infrastructures (CIs) is aiming to
improve efficiency in many crucial areas. The positive benefits of IIoT are increasing the …

[图书][B] Embedded Systems Handbook: Embedded systems design and verification

R Zurawski - 2018 - taylorfrancis.com
Considered a standard industry resource, the Embedded Systems Handbook provided
researchers and technicians with the authoritative information needed to launch a wealth of …

Proving the absence of stack overflows

D Kästner, C Ferdinand - Computer Safety, Reliability, and Security: 33rd …, 2014 - Springer
In safety-critical embedded systems the stack typically is the only dynamically allocated
memory area. However, the maximal stack usage must be statically known: at configuration …

Mtss: Multitask stack sharing for embedded systems

B Middha, M Simpson, R Barua - ACM Transactions on Embedded …, 2008 - dl.acm.org
Out-of-memory errors are a serious source of unreliability in most embedded systems.
Applications run out of main memory because of the frequent difficulty of estimating the …

Enabling trusted scheduling in embedded systems

RJ Masti, C Marforio, A Ranganathan… - Proceedings of the 28th …, 2012 - dl.acm.org
The growing complexity and increased networking of security and safety-critical systems
expose them to the risk of adversarial compromise through remote attacks. These attacks …

Safe and structured use of interrupts in real-time and embedded software

I Lee, JYT Leung, SH Son - … of Real-Time and Embedded Systems, 2007 - taylorfrancis.com
While developing embedded and real-time systems, it is usually necessary to write code that
handles interrupts, or code that interacts with interrupt handlers. Interrupts are indispensable …

Segment protection for embedded systems using run-time checks

M Simpson, B Middha, R Barua - … of the 2005 international conference on …, 2005 - dl.acm.org
The lack of virtual memory protection is a serious source of unreliability in many embedded
systems. Without the segment-level protection it provides, these systems are subject to …