Proceedings of the 5th International Conference on Embedded Networked Sensor Systems 2007
DOI: 10.1145/1322263.1322283
|View full text |Cite
|
Sign up to set email alerts
|

Efficient memory safety for TinyOS

Abstract: Reliable sensor network software is difficult to create: applications are concurrent and distributed, hardware-based memory protection is unavailable, and severe resource constraints necessitate the use of unsafe, low-level languages. Our work improves this situation by providing efficient memory and type safety for TinyOS 2 applications running on the Mica2, MicaZ, and TelosB platforms. Safe execution ensures that array and pointer errors are caught before they can corrupt RAM. Our contributions include showi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
76
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(76 citation statements)
references
References 20 publications
0
76
0
Order By: Relevance
“…Advantageously, this generation is completely automatic, with CBMC analysing an array's declaration to !nd the index bounds; SafeTinyOS (Cooprider et al, 2007), for example, has programmers explicitly type-annotate arrays with access bounds instead.…”
Section: Assertions Nondeterminism and Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Advantageously, this generation is completely automatic, with CBMC analysing an array's declaration to !nd the index bounds; SafeTinyOS (Cooprider et al, 2007), for example, has programmers explicitly type-annotate arrays with access bounds instead.…”
Section: Assertions Nondeterminism and Assumptionsmentioning
confidence: 99%
“…To this end, in the process of program transformation, tos2cprover reports to the programmer the list of encountered memory dereferences, and translates the constant address implicated to its section in the memory map, e.g., for the line: In some cases (particularly for dereferences of address 0x0), an inspection of this report is advisable to sort any null pointers from legitimate peripheral access. A similar approach is taken by SafeTinyOS (Cooprider et al, 2007), which has programmers explicitly mark legal dereferences of constants with a trusted type, and thus make null-pointer dereferences visible.…”
Section: Constant-address Dereferencementioning
confidence: 99%
See 1 more Smart Citation
“…TinyOS's own nesC compiler has a built-in simplistic data-race detector. Safe TinyOS [5] is an established TinyOS extension which enforces memory safety at runtime. It checks e.g.…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…The second has been to develop run-time monitoring (e.g., Sympathy [27]) and debugging tools (e.g., Nucleus [30], Clairvoyant [32]) that can simplify the process of discovering program errors. The third has been to develop compiletime program analysis tools [28,9,8] for catching program errors before execution.…”
Section: Introductionmentioning
confidence: 99%