Filters








316,572 Hits in 4.8 sec

Type Checking Systems Code [chapter]

Greg Morrisett
2002 Lecture Notes in Computer Science  
This invited talk discusses some approaches that show promise in achieving type safety for legacy C code.  ...  Our critical computing systems are coded in low-level, typeunsafe languages such as C, and it is unlikely that they will be re-coded in a high-level, type-safe language such as Java.  ...  of type-safety.  ... 
doi:10.1007/3-540-45927-8_1 fatcat:s2jmmtttfvb7fpmwjrqye7xojq

Bypassing portability pitfalls of high-level low-level programming

Yi Lin, Stephen M. Blackburn
2012 Proceedings of the sixth ACM workshop on Virtual machines and intermediate languages - VMIL '12  
However, when high-level languages are extended to effectively implement system projects for software engineering gain and safety, portability is compromised-high-level code for low-level programming cannot  ...  implementation, and also suitable for a low-level language bypass for improved portability.  ...  The results showed that, with proper extension and restriction, high-level languages are able to undertake the task of low-level programming, while preserving type-safety, memory-safety, encapsulation  ... 
doi:10.1145/2414740.2414746 fatcat:5o7nys7aafdgpogp3sklnddmsq

Finding and Preventing Bugs in JavaScript Bindings

Fraser Brown, Shravan Narayan, Riad S. Wahby, Dawson Engler, Ranjit Jhala, Deian Stefan
2017 2017 IEEE Symposium on Security and Privacy (SP)  
JavaScript, like many high-level languages, relies on runtime systems written in low-level C and C++.  ...  Since C++'s type system, memory model, and execution model differ significantly from JavaScript's, JavaScript code must call these runtime functions via intermediate binding layer code that translates  ...  [49] present an isolation approach for the .NET framework. They run native, unmanaged code in a separate sandboxed process mediated according to the high-level .NET security policy.  ... 
doi:10.1109/sp.2017.68 dblp:conf/sp/BrownNWEJS17 fatcat:6okseyco2bd63gsbxdgfnylyie

An Empirical Evaluation of Mutation Testing for Improving the Test Quality of Safety-Critical Software

Richard Baker, Ibrahim Habli
2013 IEEE Transactions on Software Engineering  
To demonstrate, particularly to a certification authority, that sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or mandated by safety standards and  ...  Testing provides a primary means for assuring software in safety-critical systems.  ...  They would also like to thank Rob Alexander, Katrina Attwood, and John Clark for reviewing and providing feedback on this paper.  ... 
doi:10.1109/tse.2012.56 fatcat:v2q3t55x3rbjpmx2km2p2kqlka

Assurance cases and prescriptive software safety certification: A comparative study

Richard Hawkins, Ibrahim Habli, Tim Kelly, John McDermid
2013 Safety Science  
Within certification standards, developers demonstrate this by appealing to the satisfaction of objectives that the safety assurance standards require for compliance.  ...  Other standards set out much more high-level objectives and are less prescriptive about the particular processes and techniques to be used.  ...  Code is robust with high-level requirements A7.4.3: Low-level requirements are compatible with target computer A7.6.3: Executable Object Code complies with low-level requirements A7.4.4: Low-level requirements  ... 
doi:10.1016/j.ssci.2013.04.007 fatcat:qhbmbxgo3ne4rhoaacwe44qms4

MODELLING OF SAFETY-RELATED COMMUNICATIONS FOR RAILWAY APPLICATIONS

M. Franekowa, P. Lüley
2016 Nauka ta Progres Transportu  
Transmission code did not detect all corrupted messages therefore it is necessary to use safety code independent on transmission code in safety-related applications.  ...  To obtain information on the probability of undetected error in transmission code and safety code and on the intensity of dangerous failure from the motel it was created program with graphical interface  ...  aspects of ICT within safety critical applications of processes control.  ... 
doi:10.15802/stp2016/83915 fatcat:uk33l2yvhff3lcffpmdoeqmvxy

Demystifying magic

Daniel Frampton, Stephen M. Blackburn, Perry Cheng, Robin J. Garner, David Grove, J. Eliot B. Moss, Sergey I. Salishev
2009 Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '09  
The time has come for high-level low-level programming to be taken more seriously: 1) more projects now use high-level languages for systems programming, 2) increasing architectural heterogeneity and parallelism  ...  The contribution of this paper is three-fold: 1) we draw together common threads in a diverse literature, 2) we identify a framework for extending high-level languages for low-level programming, and 3)  ...  Acknowledgments We thank our anonymous reviewers for helping us to improve the paper.  ... 
doi:10.1145/1508293.1508305 dblp:conf/vee/FramptonBCGGMS09 fatcat:ozugfothfnel5anyk6zesx7foy

The source is the proof

Vivek Haldar, Christian H. Stork, Michael Franz
2002 Proceedings of the 2002 workshop on New security paradigms - NSPW '02  
We challenge the apparent consensus for using bytecode verification and techniques related to proof-carrying code for mobile code security.  ...  Our high-level encoding can achieve safe end-to-end transport of program source semantics.  ...  It is also an open question how proofs can be generated for properties other than type-safety. All the applications of PCC so far have been on low-level code.  ... 
doi:10.1145/844111.844114 fatcat:xxccnuxqzjfa5jqhot5hn3yhoy

The source is the proof

Vivek Haldar, Christian H. Stork, Michael Franz
2002 Proceedings of the 2002 workshop on New security paradigms - NSPW '02  
We challenge the apparent consensus for using bytecode verification and techniques related to proof-carrying code for mobile code security.  ...  Our high-level encoding can achieve safe end-to-end transport of program source semantics.  ...  It is also an open question how proofs can be generated for properties other than type-safety. All the applications of PCC so far have been on low-level code.  ... 
doi:10.1145/844102.844114 dblp:conf/nspw/HaldarSF02 fatcat:rgezjvbx6ra6jo7xakao5x6dfi

Robotic Systems Safety [chapter]

Victor Chang, Lindsay Evans
2009 Safety Design for Space Systems  
our approach is based on low-level analysis.  ...  Safety certification is a method for achieving industryrequired levels of reliability and dependability, while addressing liability (see [10] ).  ... 
doi:10.1016/b978-0-7506-8580-1.00009-9 fatcat:srfa7qokxbbcfggandqn37atcu

Radiological Analysis of Transport and Storage Container for Very Low-Level Liquid Radioactive Waste

Seung Hun Shin, Woo Nyun Choi, Seungbin Yoon, Hee Reyoung Kim
2021 Nuclear Engineering and Technology  
To transport and store liquid phase very 11 low-level radioactive waste (VLLW), a container is designed by considering related regulations.  ...  The radiation shielding calculation was performed according to the composition change 14 of barium sulfate (BaSO 4 ) using the Monte Carlo N-Particle (MCNP) code.  ...  Structure of transport and storage container for very low-level liquid waste. Schematic view of inner container, HDPE and BaSO 4 mixture and liquid VLLW.  ... 
doi:10.1016/j.net.2021.06.024 fatcat:fmpquti73jamjase5kbt3pt3gy

LMS-Verify: abstraction without regret for verified systems programming

Nada Amin, Tiark Rompf
2017 SIGPLAN notices  
We also show how type classes can automatically attach invariants to data types, reducing the need for repetitive manual annotations.  ...  This is bad because low-level code in unsafe languages attracts security vulnerabilities and because development is far less productive, with PL advances mostly lost on programmers operating under tight  ...  Acknowledgments The authors thank Viktor Kuncak and Sandrine Blazy for insightful discussions.  ... 
doi:10.1145/3093333.3009867 fatcat:wzdor44y4jgmliywznkftexpnu

Safe to the last instruction

Jean Yang, Chris Hawblitzel
2011 Communications of the ACM  
Typed assembly language (TAL) and Hoare logic can verify the absence of many kinds of errors in low-level code.  ...  More generally, Verve's approach demonstrates a practical way to mix high-level typed code with low-level untyped code in a verifiably safe manner.  ...  Acknowledgments We would like to thank Jeremy Condit, Galen Hunt, Ed Nightingale, Don Porter, Shaz Qadeer, Rustan Leino, Juan Chen, and David Tarditi for their suggestions and assistance.  ... 
doi:10.1145/2043174.2043197 fatcat:a45iryrgefgm3pvcmgtgcsflia

LMS-Verify: abstraction without regret for verified systems programming

Nada Amin, Tiark Rompf
2017 Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages - POPL 2017  
We also show how type classes can automatically attach invariants to data types, reducing the need for repetitive manual annotations.  ...  This is bad because low-level code in unsafe languages attracts security vulnerabilities and because development is far less productive, with PL advances mostly lost on programmers operating under tight  ...  Acknowledgments The authors thank Viktor Kuncak and Sandrine Blazy for insightful discussions.  ... 
doi:10.1145/3009837.3009867 fatcat:pkp6vnsu7ja2pfqbznp6clva5u

Intelligent Helmet Safety System For Mine Workers

BHOSALE GAURAV, DEOKATE SNEHAL
2017 Zenodo  
The first is the level of the hazardous gases such as methane,butane,etc. for which MQ4 gas sensor is used.  ...  This project proposed an embedded system for mine worker�s safety purpose using ARM7.A smart helmet has been developed that is able to detection of hazardous events in the mines industry.  ...  For critical code size applications, the alternative 16-bit Thumb mode reduces code by more than 30 % with minimal performance penalty.  ... 
doi:10.5281/zenodo.1461230 fatcat:r56gfl7fznetnc6puoeksdgje4
« Previous Showing results 1 — 15 out of 316,572 results