Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001
DOI: 10.1109/icse.2001.919080
|View full text |Cite
|
Sign up to set email alerts
|

Static checking of interrupt-driven software

Abstract: Resource-constrained devices are becoming ubiquitous. Examples include cell phones, palm pilots, and digital thermostats. It can be difficult to fit required functionality into such a device without sacrificing the simplicity and clarity of the software. Increasingly complex embedded systems require extensive brute-force testing, making development and maintenance costly. This is particularly true for system components that are written in assembly language. Static checking has the potential of alleviating thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(43 citation statements)
references
References 11 publications
0
43
0
Order By: Relevance
“…Closest of all to our research was the development of a model checking tool for software running on the Z86 processor [5]. As in our work, the emphasis was on interruptdependent programs written in assembly code.…”
Section: Previous Workmentioning
confidence: 99%
“…Closest of all to our research was the development of a model checking tool for software running on the Z86 processor [5]. As in our work, the emphasis was on interruptdependent programs written in assembly code.…”
Section: Previous Workmentioning
confidence: 99%
“…Estimating the worst-case stack memory usage of a program is not totally straightforward, but the problem has been previously addressed [Brylow et al 2001, McCartney and Sridhar 2006, Regehr et al 2003]. Our approach to bounding stack memory consumption is based on this previous work: we have a program that walks the callgraphs of an AVR binary, conservatively estimating the worstcase stack depth of each function as it is found.…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…This permits developers to avoid a difficult problem: predicting worst-case stack memory usage. Another way to avoid this problem is to use a static analysis tool [Brylow et al 2001, McCartney and Sridhar 2006, Regehr et al 2003]. However, for various reasons these tools are not in widespread use and in practice developers rely on guesswork [Ganssle 1999].…”
Section: Toward Bounded Memory Usagementioning
confidence: 99%
“…AbsInt sells a standalone stack depth analysis tool called StackAnalyzer [1]. The only tools that we know of that analyze stack depth in the presence of interrupts are ours [16] and Brylow et al's [5]. In related work, Barua et al [3] investigate an approach that, upon detecting stack overflow, spills the stack data into an unused region of RAM, if one is available.…”
Section: Tools For Stack Depth Analysismentioning
confidence: 99%