Proceedings of the 2004 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems 2004
DOI: 10.1145/1023833.1023872
|View full text |Cite
|
Sign up to set email alerts
|

Memory overflow protection for embedded systems using run-time checks, reuse and compression

Abstract: Out-of-memory errors are a serious source of unreliability in most embedded systems. Applications run out of main memory because of the frequent difficulty of estimating the memory requirement before deployment, either because it depends on input data, or because certain language features prevent estimation. The typical lack of disks and virtual memory in embedded systems has two serious consequences when an out-of-memory error occurs. First, there is no swap space for the application to grow into, and the sys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0
1

Year Published

2006
2006
2017
2017

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(31 citation statements)
references
References 19 publications
0
30
0
1
Order By: Relevance
“…Like paging, segmented virtual memory is a common approach for providing coarse-grained memory protection. In another method, Biswas et al [54] developed a technique for avoiding out-of-memory errors with compilerinserted runtime checks, memory reuse, and the compression of unused data. Finally, Middha et al [55] developed a similar method for avoiding out-of-memory errors in embedded systems by sharing stack space among the executing tasks of multitasking workloads.…”
Section: Other Methods Of Memory Protectionmentioning
confidence: 99%
“…Like paging, segmented virtual memory is a common approach for providing coarse-grained memory protection. In another method, Biswas et al [54] developed a technique for avoiding out-of-memory errors with compilerinserted runtime checks, memory reuse, and the compression of unused data. Finally, Middha et al [55] developed a similar method for avoiding out-of-memory errors in embedded systems by sharing stack space among the executing tasks of multitasking workloads.…”
Section: Other Methods Of Memory Protectionmentioning
confidence: 99%
“…Like function inlining [Cooper et al 1991] and cloning [Cooper et al 1993], flattening copies code and alters control flow in simple ways, with the goal of enabling subsequent optimizations to do a better job. Biswas et al [2004] and Middha et al [2005] use compilerdriven techniques to blur the lines between different storage regions. This permits, for example, stacks to overflow into unused parts of the heap, globals, or other stacks.…”
Section: Related Workmentioning
confidence: 99%
“…The only tools that we know of that analyze stack depth in the presence of interrupts are ours [16] and Brylow et al's [5]. In related work, Barua et al [3] investigate an approach that, upon detecting stack overflow, spills the stack data into an unused region of RAM, if one is available.…”
Section: Tools For Stack Depth Analysismentioning
confidence: 99%