2008
DOI: 10.1007/978-3-540-85114-1_12
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: Abstract. Flash memory has become virtually indispensable in most mobile devices. In order for mobile devices to operate successfully, it is essential that flash memory be controlled correctly through the device driver software. However, as is typical for embedded software, conventional testing methods often fail to detect hidden flaws in the complex device driver software. This deficiency incurs significant development and operation overhead to the manufacturers. In order to compensate for the weaknesses of c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 28 publications
(9 reference statements)
0
9
0
Order By: Relevance
“…The requirement property we checked is that the read buffer of MSR should contain corresponding data in physical sectors at the end of MSR. In addition, to obtain valid verification results, we had to provide an operational environment of MSR such as following: We applied model checking techniques to MSR through a symbolic model checker NuSMV [3], an explicit model checker Spin [7], and C-bounded model checker CBMC [4] (more detail can be found in [9]) using 64 bit Linux machine equipped with 3 Ghz Xeon dual-core cpu. For NuSMV and Spin, we built a model for MSR manually.…”
Section: Analysis Results and Discussionmentioning
confidence: 99%
“…Furthermore, concrete applications of such techniques can guide new research directions to solve practical limitations observed in the studies. In this paper, we share our experience of applying various tools of model checking, software model checking, and concolic testing to flash memory storage platform [9,11,10] and smartphone platform [12].…”
Section: Introductionmentioning
confidence: 99%
“…The outermost loop iterates over LUs of data (line 2-18) until the numScts amount of the logical sectors are read completely. The second outermost loop iterates until the LS's of the current LU are completely read (line [5][6][7][8][9][10][11][12][13][14][15][16]. The third loop iterates over PUs mapped to the current LU (line 7-15).…”
Section: Multi-sector Read Operationmentioning
confidence: 99%
“…Through the various experiments carried out to analyze MSR, including conventional testing [16], concolic testing, and model checking [15], we found that it is important to build an accurate and efficient environment model for the analysis of a flash file system. Also, it was found that different analysis techniques can commonly use the same environment model.…”
Section: Importance Of An Environment Modelmentioning
confidence: 99%
See 1 more Smart Citation