No crash, no exploit: Automated verification of embedded kernels
The kernel is the most safety-and security-critical component of many computer systems, as
the most severe bugs lead to complete system crash or exploit. It is thus desirable to …
the most severe bugs lead to complete system crash or exploit. It is thus desirable to …
Automated verification of the FreeRTOS scheduler in Hip/Sleek
Automated verification of operating system kernels is a challenging problem, partly due to
the use of shared mutable data structures. In this paper, we show how we can automatically …
the use of shared mutable data structures. In this paper, we show how we can automatically …
Using formal reasoning on a model of tasks for FreeRTOS
FreeRTOS is an open-source real-time microkernel that has a wide community of users. We
present the formal specification of the behaviour of the task part of FreeRTOS that deals with …
present the formal specification of the behaviour of the task part of FreeRTOS that deals with …
A localization and an identification system of personnel in areas at risk using a wireless sensor network
In this paper, we present the design of a new embedded real time system that performs two
main tasks, the localization based on the received signal strength indicator (RSSI) and the …
main tasks, the localization based on the received signal strength indicator (RSSI) and the …
Automated verification of systems code using type-based memory abstractions
O Nicole - 2022 - theses.hal.science
As software is an essential component of many embedded systems or online information
systems, its malfunction can cause harm or security vulnerabilities. New bugs and …
systems, its malfunction can cause harm or security vulnerabilities. New bugs and …
Automatic verification of tasks schedulers
J Giet - 2024 - hal.science
The aim of this thesis is the verification of task schedulers for operating systems through
static analysis based on abstract interpretation. Operating systems are collections of …
static analysis based on abstract interpretation. Operating systems are collections of …
Automatically Proving Microkernels Free from Privilege Escalation from their Executable
Operating system kernels are the security keystone of most computer systems, as they
provide the core protection mechanisms. Kernels are in particular responsible for their own …
provide the core protection mechanisms. Kernels are in particular responsible for their own …
Mining components for a software architecture and a product line: the options analysis for reengineering (OAR) method
Automated verification of operating system kernels is a challenging problem, partly due to
the use of shared mutable data structures. In this paper, we show how we can automatically …
the use of shared mutable data structures. In this paper, we show how we can automatically …
Formally modelling and verifying the FreeRTOS real-time operating system
S Cheng - 2014 - etheses.whiterose.ac.uk
Formal methods is an alternative way to develop software, which applies math-ematical
techniques to software design and verification. It ensures logical consistency between the …
techniques to software design and verification. It ensures logical consistency between the …
Fast constant time memory allocator for inter task communication in ultra low energy embedded systems
G Rebel, FJ Estevez, I Schulz… - Proceedings of the …, 2013 - ieeexplore.ieee.org
Modern microcontrollers provide enough processing power to benefit from the advantages
of multitasking schedulers or operating systems even in the area of small, battery based or …
of multitasking schedulers or operating systems even in the area of small, battery based or …