A Systematic Literature Review on Requirements Engineering and Maintenance for Embedded Software
Embedded software quality is a critical concern in modern engineering, impacting a broad
range of applications from spacecraft to complex control systems. Requirements …
range of applications from spacecraft to complex control systems. Requirements …
An Empirical Study on Concurrency Bugs in Interrupt-Driven Embedded Software
C Li, R Chen, B Wang, Z Wang, T Yu, Y Jiang… - Proceedings of the …, 2023 - dl.acm.org
Interrupt-driven embedded software is widely used in aerospace, automotive electronics,
medical equipment, IoT, and other industrial fields. This type of software is usually …
medical equipment, IoT, and other industrial fields. This type of software is usually …
Acetest: Automated constraint extraction for testing deep learning operators
Deep learning (DL) applications are prevalent nowadays as they can help with multiple
tasks. DL libraries are essential for building DL applications. Furthermore, DL operators are …
tasks. DL libraries are essential for building DL applications. Furthermore, DL operators are …
Yashme: detecting persistency races
Persistent memory (PM) or Non-Volatile Random-Access Memory (NVRAM) hardware such
as Intel's Optane memory product promises to transform how programs store and manipulate …
as Intel's Optane memory product promises to transform how programs store and manipulate …
On the design of IoT security: Analysis of software vulnerabilities for smart grids
The 5G communication network will underpin a vast number of new and emerging services,
paving the way for unprecedented performance and capabilities in mobile networks. In this …
paving the way for unprecedented performance and capabilities in mobile networks. In this …
Firmware fuzzing: The state of the art
C Zhang, Y Wang, L Wang - Proceedings of the 12th Asia-Pacific …, 2020 - dl.acm.org
Background: Firmware is the enable software of Internet of Things (IoT) devices, and its
software vulnerabilities are one of the primary reason of IoT devices being exploited. Due to …
software vulnerabilities are one of the primary reason of IoT devices being exploited. Due to …
Precise and efficient atomicity violation detection for interrupt-driven programs via staged path pruning
Interrupt-driven programs are widely used in aerospace and other safety-critical areas.
However, uncertain interleaving execution of interrupts may cause concurrency bugs, which …
However, uncertain interleaving execution of interrupts may cause concurrency bugs, which …
Modular verification of interrupt-driven software
Interrupts have been widely used in safety-critical computer systems to handle outside
stimuli and interact with the hardware, but reasoning about interrupt-driven software remains …
stimuli and interact with the hardware, but reasoning about interrupt-driven software remains …
Concrat: An automatic C-to-Rust lock API translator for concurrent programs
Concurrent programs suffer from data races. To prevent data races, programmers use locks.
However, programs can eliminate data races only when they acquire and release correct …
However, programs can eliminate data races only when they acquire and release correct …
Automatic detection, validation, and repair of race conditions in interrupt-driven embedded software
Interrupt-driven programs are widely deployed in safety-critical embedded systems to
perform hardware and resource dependent data operation tasks. The frequent use of …
perform hardware and resource dependent data operation tasks. The frequent use of …