2018
DOI: 10.1007/978-3-319-77935-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Ghosts for Lists: A Critical Module of Contiki Verified in Frama-C

Abstract: Internet of Things (IoT) applications are becoming increasingly critical and require rigorous formal verification. In this paper we target Contiki, a widely used open-source OS for IoT, and present a verification case study of one of its most critical modules: that of linked lists. Its API and list representation differ from the classical linked list implementations, and are particularly challenging for deductive verification. The proposed verification technique relies on a parallel view of a list through a co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 22 publications
(28 reference statements)
0
20
0
Order By: Relevance
“…For specification and verification of the list module, it is convenient to have a more abstract view of the elements of a linked list. In a previous work [6], we used a companion ghost array for this purpose. Our new approach relies on a companion logic list and uses the logic list datatype available in Acsl.…”
Section: Modeling Linked Lists Using Logic Listsmentioning
confidence: 99%
See 4 more Smart Citations
“…For specification and verification of the list module, it is convenient to have a more abstract view of the elements of a linked list. In a previous work [6], we used a companion ghost array for this purpose. Our new approach relies on a companion logic list and uses the logic list datatype available in Acsl.…”
Section: Modeling Linked Lists Using Logic Listsmentioning
confidence: 99%
“…At the beginning of its development in 2002, the security of Contiki was not the main concern. Security of communication was introduced later, while the source code has become a target of formal verification only very recently [6,19,21].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations