Range Analysis of Microcontroller Code Using Bit-Level Congruences

被引:0
|
作者
Brauer, Joerg [1 ]
King, Andy [2 ]
Kowalewski, Stefan [1 ]
机构
[1] Rhein Westfal TH Aachen, Embedded Software Lab, Aachen, Germany
[2] Portcullis Comp Secur, London HA5 2EX, England
来源
FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS | 2010年 / 6371卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Bitwise instructions, loops and indirect data access pose difficult challenges to the verification of microcontroller programs. In particular, it is necessary to show that an indirect write does not mutate registers, which are indirectly addressable. To prove this property, among others, this paper presents a relational binary-code semantics and details how this can be used to compute program invariants in terms of bit-level congruences. Moreover, it demonstrates how congruences can be combined with intervals to derive accurate ranges, as well as information about strided indirect memory accesses.
引用
收藏
页码:82 / +
页数:3
相关论文
共 50 条
  • [41] A BIT-LEVEL SYSTOLIC ARRAY FOR MEDIAN FILTER
    CHANG, LW
    LIN, JH
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1992, 40 (08) : 2079 - 2083
  • [42] ON THE SPECIFIC EXPRESSION OF BIT-LEVEL ARITHMETIC CODING
    赵风光
    蒋尔雄
    倪兴芳
    "Numerical Mathematics A Journal of Chinese Universities(English Series) N", 1998, (02) : 211 - 220
  • [43] Effect of Bit-Level Correlation In Stochastic Computing
    Parhi, Megha
    Riedel, Marc D.
    Parhi, Keshab K.
    2015 IEEE INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2015, : 463 - 467
  • [44] Bit-Level Probabilistically Shaped Coded Modulation
    Pikus, Marcin
    Xu, Wen
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (09) : 1929 - 1932
  • [45] Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation
    Zhang, Ying-Qian
    Wang, Xing-Yuan
    NONLINEAR DYNAMICS, 2014, 77 (03) : 687 - 698
  • [46] Correlation Power Analysis using Bit-Level Biased Activity Plaintexts against AES Cores with Countermeasures
    Fujimoto, Daisuke
    Miura, Noriyuki
    Nagata, Makoto
    Hayashi, Yuichi
    Homma, Naofumi
    Aoki, Takafumi
    Hori, Yohei
    Katashita, Toshihiro
    Sakiyama, Kazuo
    Thanh-Ha Le
    Bringer, Julien
    Bazargan-Sabet, Pirouz
    Bhasin, Shivam
    Danger, Jean-Luc
    2014 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, TOKYO (EMC'14/TOKYO), 2014, : 306 - 309
  • [47] Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation
    Ying-Qian Zhang
    Xing-Yuan Wang
    Nonlinear Dynamics, 2014, 77 : 687 - 698
  • [48] Bit-level Differential Power Analysis Attack on implementations of Advanced Encryption Standard software running inside a PIC18F2420 Microcontroller
    Mpalane, K.
    Tsague, H. D.
    Gasela, N.
    Esiefarienrhe, B. M.
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 42 - 46
  • [49] Modifying Bit-Level Data Compression Scheme based on Adaptive Hamming Code Data Compression Algorithm
    Mendoza, Harwin C.
    Sison, Ariel M.
    Medina, Ruji P.
    2019 INTERNATIONAL CONFERENCE ON MULTIMEDIA ANALYSIS AND PATTERN RECOGNITION (MAPR), 2019,
  • [50] Security analysis of a color image encryption based on bit-level and chaotic map
    Heping Wen
    Ruiting Chen
    Jieyi Yang
    Tianle Zheng
    Jiahao Wu
    Wenxing Lin
    Huilin Jian
    Yiting Lin
    Linchao Ma
    Zhen Liu
    Chongfu Zhang
    Multimedia Tools and Applications, 2024, 83 : 4133 - 4149