2008 International Conference on Software Testing, Verification, and Validation 2008
DOI: 10.1109/icst.2008.55
|View full text |Cite
|
Sign up to set email alerts
|

Pre-testing Flash Device Driver through Model Checking Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…IJON [29] leverages annotations from a human analyst to overcome significant roadblocks in fuzzing and find deep‐state bugs. RVFUZZER [36] targets input validation bugs in robotic vehicles. GREYHOUND [15] directs a Wi‐Fi client to exhibit anomalous behaviors that deviate from Wi‐Fi protocols.…”
Section: Research Progress On Dgfmentioning
confidence: 99%
“…IJON [29] leverages annotations from a human analyst to overcome significant roadblocks in fuzzing and find deep‐state bugs. RVFUZZER [36] targets input validation bugs in robotic vehicles. GREYHOUND [15] directs a Wi‐Fi client to exhibit anomalous behaviors that deviate from Wi‐Fi protocols.…”
Section: Research Progress On Dgfmentioning
confidence: 99%
“…The authors modelled the basic operations of filesystem as well as other features that are crucial to NAND flash hardware, such as wear-leveling and erase-unit reclamation. Papers [16,15,17,18] document experiments in the formal verification of OneNAND TM Flash Memory which is a trademark of Samsung Electronics.…”
Section: Verification Of Flash Memory Behaviourmentioning
confidence: 99%
“…Through the various experiments carried out to analyze MSR, including conventional testing [16], concolic testing, and model checking [15], we found that it is important to build an accurate and efficient environment model for the analysis of a flash file system. Also, it was found that different analysis techniques can commonly use the same environment model.…”
Section: Importance Of An Environment Modelmentioning
confidence: 99%
“…The outermost loop iterates over LUs of data (line 2-18) until the numScts amount of the logical sectors are read completely. The second outermost loop iterates until the LS's of the current LU are completely read (line [5][6][7][8][9][10][11][12][13][14][15][16]. The third loop iterates over PUs mapped to the current LU (line 7-15).…”
Section: Multi-sector Read Operationmentioning
confidence: 99%