Range Analysis of Microcontroller Code Using Bit-Level Congruences

被引:0
|
作者
Brauer, Joerg [1 ]
King, Andy [2 ]
Kowalewski, Stefan [1 ]
机构
[1] Rhein Westfal TH Aachen, Embedded Software Lab, Aachen, Germany
[2] Portcullis Comp Secur, London HA5 2EX, England
来源
FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS | 2010年 / 6371卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Bitwise instructions, loops and indirect data access pose difficult challenges to the verification of microcontroller programs. In particular, it is necessary to show that an indirect write does not mutate registers, which are indirectly addressable. To prove this property, among others, this paper presents a relational binary-code semantics and details how this can be used to compute program invariants in terms of bit-level congruences. Moreover, it demonstrates how congruences can be combined with intervals to derive accurate ranges, as well as information about strided indirect memory accesses.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [1] Bit-Level Taint Analysis
    Yadegari, Babak
    Debray, Saumya
    2014 14TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2014), 2014, : 255 - 264
  • [2] Bit-level analysis of an SRT divider circuit
    Bryant, RE
    33RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 1996, 1996, : 661 - 665
  • [3] BAT: The bit-level analysis tools - (Tool paper)
    Manolios, Panagiotis
    Srinivasan, Sudarshan K.
    Vroon, Daron
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2007, 4590 : 303 - +
  • [4] Abstract interpretation of microcontroller code: Intervals meet congruences
    Brauer, Joerg
    King, Andy
    Kowalewski, Stefan
    SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (07) : 862 - 883
  • [5] Bit-level Locking for Concurrency Control
    Abbass, Jad F.
    Haraty, Ramzi A.
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 168 - 173
  • [6] A Bit-Level Block Cipher Diffusion Analysis Test - BLDAT
    Bhowmik, Dipanjan
    Datta, Avijit
    Sinha, Sharad
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 667 - 674
  • [7] Document image secret sharing using bit-level processing
    Lukac, R
    Plataniotis, KN
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 2893 - 2896
  • [8] Automatic transformation of bit-level C code to support multiple equivalent data layouts
    Nita, Marius
    Grossman, Dan
    COMPILER CONSTRUCTION, 2008, 4959 : 85 - 99
  • [9] Bit-level image encryption algorithm based on BP neural network and gray code
    Xingyuan Wang
    Shujuan Lin
    Yong Li
    Multimedia Tools and Applications, 2021, 80 : 11655 - 11670
  • [10] Bit-Level Optimized Constant Multiplication Using Boolean Satisfiability
    Fiege, Nicolai
    Kumm, Martin
    Zipf, Peter
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2024, 71 (01) : 249 - 261