The Experts below are selected from a list of 2781 Experts worldwide ranked by ideXlab platform
Zhang Chao - One of the best experts on this subject based on the ideXlab platform.
-
software simulation to trigger and monitor Interrupt in windows nt 2000
Computer Engineering, 2003Co-Authors: Zhang ChaoAbstract:This article introduces about Intel three rings system,segment selectors and callgates.It brings a method about how to enter Windows NT ring 0 from NT user mode. And so,it solves the problem of how to trigger and monitor the Hardware Interrupt by software simulation.
Marta Kwiatkowska - One of the best experts on this subject based on the ideXlab platform.
-
On Software Verification for Sensor Nodes
2013Co-Authors: Doina Bucur, Marta KwiatkowskaAbstract:We consider software written for networked, wireless sensor nodes, and specialize software verification techniques for standard C programs in order to locate programming errors in sensor applications before the software’s deployment on motes. Ensuring the reliability of sensor applications is challenging: lowlevel, Interrupt-driven code runs without memory protection in dynamic environments. The difficulties lie with (i) being able to automatically extract standard C models out of the particular flavours of embedded C used in sensor programming solutions, and (ii) decreasing the resulting program’s state space to a degree that allows practical verification times. We contribute a platform-dependent, OS-independent software verification tool for OS-wide programs written in MSP430 embedded C with asynchronous Hardware Interrupts. Our tool automatically translates the program into standard C by modelling the MCU’s memory map and direct memory access. To emulate the existence of Hardware Interrupts, calls to Hardware Interrupt handlers are added, and their occurrence is minimized with a double strategy: a partial-order reduction technique, and a supplementary reachability check to reduce overapproximation. This decreases the program’s state space, while preserving program semantics. Safety specifications are written as C assertions embedded in the code. The resulting sequential program is then passed to CBMC, a bounded software verifier for sequential ANSI C. Besides standard errors (e.g., out-of-bounds arrays, null-pointer dereferences), this tool chain is able to verify application-specific assertions, including low-level assertions upon the state of the registers and peripherals. Verification for wireless sensor network applications is an emerging field of research; thus, as a final note, we survey current research on the topic
-
On Software Verification for Sensor Nodes
2010Co-Authors: Doina Bucur, Marta KwiatkowskaAbstract:We consider software written for networked, wireless sensornodes,andspecializesoftwareverificationtechniques forstandard Cprogramsinordertolocateprogrammingerrorsinsensor applications before the software’s deployment on motes. Ensuring the reliability of sensor applications is challenging: low-level, Interrupt-driven code runs without memory protection in dynamic environments. The difficulties lie with (i) being able to automatically extract standard C models out of the particular flavours of embedded C used in sensor programming solutions, and (ii) decreasing the resulting program’s state space to a degree that allows practical verification times. We contribute a platform-dependent, OS-independent software verification tool for OS-wide programs written in MSP430 embedded C with asynchronous Hardware Interrupts. Our tool automatically translates the program into standard C by modelling the MCU’s memory map and direct memory access. To emulate the existence of Hardware Interrupts, calls to Hardware Interrupt handlers are added, and their occurrence is minimized with a partial-order reduction technique, in order to decrease the program’s state space, while preserving program semantics. Safety specifications are written as C assertions embedded in the code. The resulting sequential program is then passed to CBMC, a bounded software verifierforsequentialANSIC. Besidesstandarderrors (e.g., out-of-bounds arrays, null-pointer dereferences), this tool chain is able to verify application-specific assertions,includinglow-level assertions upon the state of the registers and peripherals. Verification for wireless sensor network applications is an emerging field of research; thus, as a final note, we survey current research on the topic
Doina Bucur - One of the best experts on this subject based on the ideXlab platform.
-
On Software Verification for Sensor Nodes
2013Co-Authors: Doina Bucur, Marta KwiatkowskaAbstract:We consider software written for networked, wireless sensor nodes, and specialize software verification techniques for standard C programs in order to locate programming errors in sensor applications before the software’s deployment on motes. Ensuring the reliability of sensor applications is challenging: lowlevel, Interrupt-driven code runs without memory protection in dynamic environments. The difficulties lie with (i) being able to automatically extract standard C models out of the particular flavours of embedded C used in sensor programming solutions, and (ii) decreasing the resulting program’s state space to a degree that allows practical verification times. We contribute a platform-dependent, OS-independent software verification tool for OS-wide programs written in MSP430 embedded C with asynchronous Hardware Interrupts. Our tool automatically translates the program into standard C by modelling the MCU’s memory map and direct memory access. To emulate the existence of Hardware Interrupts, calls to Hardware Interrupt handlers are added, and their occurrence is minimized with a double strategy: a partial-order reduction technique, and a supplementary reachability check to reduce overapproximation. This decreases the program’s state space, while preserving program semantics. Safety specifications are written as C assertions embedded in the code. The resulting sequential program is then passed to CBMC, a bounded software verifier for sequential ANSI C. Besides standard errors (e.g., out-of-bounds arrays, null-pointer dereferences), this tool chain is able to verify application-specific assertions, including low-level assertions upon the state of the registers and peripherals. Verification for wireless sensor network applications is an emerging field of research; thus, as a final note, we survey current research on the topic
-
On Software Verification for Sensor Nodes
2010Co-Authors: Doina Bucur, Marta KwiatkowskaAbstract:We consider software written for networked, wireless sensornodes,andspecializesoftwareverificationtechniques forstandard Cprogramsinordertolocateprogrammingerrorsinsensor applications before the software’s deployment on motes. Ensuring the reliability of sensor applications is challenging: low-level, Interrupt-driven code runs without memory protection in dynamic environments. The difficulties lie with (i) being able to automatically extract standard C models out of the particular flavours of embedded C used in sensor programming solutions, and (ii) decreasing the resulting program’s state space to a degree that allows practical verification times. We contribute a platform-dependent, OS-independent software verification tool for OS-wide programs written in MSP430 embedded C with asynchronous Hardware Interrupts. Our tool automatically translates the program into standard C by modelling the MCU’s memory map and direct memory access. To emulate the existence of Hardware Interrupts, calls to Hardware Interrupt handlers are added, and their occurrence is minimized with a partial-order reduction technique, in order to decrease the program’s state space, while preserving program semantics. Safety specifications are written as C assertions embedded in the code. The resulting sequential program is then passed to CBMC, a bounded software verifierforsequentialANSIC. Besidesstandarderrors (e.g., out-of-bounds arrays, null-pointer dereferences), this tool chain is able to verify application-specific assertions,includinglow-level assertions upon the state of the registers and peripherals. Verification for wireless sensor network applications is an emerging field of research; thus, as a final note, we survey current research on the topic
A. Tavares - One of the best experts on this subject based on the ideXlab platform.
-
Porting SLOTH system to FreeRTOS running on ARM Cortex-M3
2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE), 2014Co-Authors: S. Pinto, E. Qaralleh, F. Alves, J. Pereira, J. Cabral, Mongkol Ekpanyapong, D. Oliveira, A. TavaresAbstract:Traditionally, operating system (OSes) suffers from a bifid priority space dictated by the co-existence of threads managed by kernel scheduler and asynchronous Interrupt handlers scheduled by Hardware. On real-time systems, where reliability and determinism plays a critical role, this approach presents a noteworthy lack, as any Interrupt handler can Interrupt an execution thread, regardless of its priority. This paper presents the implementation of an unified priority space approach (SLOTH), handling each thread as an Interrupt. A light-weight version of FreeRTOS was internally redesigned, to replace the software scheduler by a Hardware one, which exploits a Commercial Off-The-Shelf (COTS) Hardware Interrupt controller, provided by ARM Cortex-M3. The results showed that our implementation solves the priority inversion problem, and simultaneously improves the system performance, reduces the memory footprint and simplifies maintainability.
Kwiatkowska M - One of the best experts on this subject based on the ideXlab platform.
-
On software verification for sensor nodes
'Elsevier BV', 2011Co-Authors: Bucur D, Kwiatkowska MAbstract:We consider software written for networked, wireless sensor nodes, and specialize software verification techniques for standard C programs in order to locate programming errors in sensor applications before the software's deployment on motes. Ensuring the reliability of sensor applications is challenging: low-level, Interrupt-driven code runs without memory protection in dynamic environments. The difficulties lie with (i) being able to automatically extract standard C models out of the particular flavours of embedded C used in sensor programming solutions, and (ii) decreasing the resulting program's state space to a degree that allows practical verification times. We contribute a platform-dependent, OS-independent software verification tool for OS-wide programs written in MSP430 embedded C with asynchronous Hardware Interrupts. Our tool automatically translates the program into standard C by modelling the MCU's memory map and direct memory access. To emulate the existence of Hardware Interrupts, calls to Hardware Interrupt handlers are added, and their occurrence is minimized with a double strategy: a partial-order reduction technique, and a supplementary reachability check to reduce overapproximation. This decreases the program's state space, while preserving program semantics. Safety specifications are written as C assertions embedded in the code. The resulting sequential program is then passed to CBMC, a bounded software verifier for sequential ANSI C. Besides standard errors (e.g.; out-of-bounds arrays, null-pointer dereferences), this tool chain is able to verify application-specific assertions, including low-level assertions upon the state of the registers and peripherals. Verification for wireless sensor network applications is an emerging field of research; thus, as a final note, we survey current research on the topic. © 2011 Elsevier Inc