2006
DOI: 10.1145/1196636.1196637
|View full text |Cite
|
Sign up to set email alerts
|

Memory overflow protection for embedded systems using run-time checks, reuse, and compression

Abstract: Out-of-memory errors are a serious source of unreliability in most embedded systems. Applications run out of main memory because of the frequent difficulty of estimating the memory requirement before deployment, either because it depends on input data, or because certain language features prevent estimation. The typical lack of disks and virtual memory in embedded systems has two serious consequences when an out-of-memory error occurs. First, there is no swap space for the application to grow into, and the sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…There are various methods for the detection and prevention of SOF in embedded systems. For example, software for dynamic overflow checking is incorporated when applications are compiled [17], return addresses and pointers are rewritten in advance [18,19], and hardware such as MPUs (memory protection unit, ARM-specific hardware) or MMUs is employed [20][21][22][23].…”
Section: Outline Of Related Researchmentioning
confidence: 99%
See 2 more Smart Citations
“…There are various methods for the detection and prevention of SOF in embedded systems. For example, software for dynamic overflow checking is incorporated when applications are compiled [17], return addresses and pointers are rewritten in advance [18,19], and hardware such as MPUs (memory protection unit, ARM-specific hardware) or MMUs is employed [20][21][22][23].…”
Section: Outline Of Related Researchmentioning
confidence: 99%
“…Since embedded systems are not usually provided with overflow detection functions and swap areas, memory overflow cannot be dealt with by using virtual memory. Thus, memory overflow protection is provided in which overflow detection software is incorporated into application software at compile time [17].…”
Section: Dynamic Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The constrained nature of RAM in embedded systems is well known and a number of research efforts have addressed this problem using online schemes that dynamically recover unused or poorly used space. Biswas et al [7] and Middha et al [19] use compiler-driven techniques to blur the lines between different storage regions. This permits, for example, stacks to overflow into unused parts of the heap, globals, or other stacks.…”
Section: Static Bitwidth Analysismentioning
confidence: 99%
“…Our work targets legacy C code and reduces RAM requirements automatically and transparently. Compile-time predictability rules out online RAM compression, a family of techniques that find and exploit redundant data as a system executes [7,32].…”
Section: Introductionmentioning
confidence: 99%