Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1215995.1216001acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Efficient type and memory safety for tiny embedded systems

Published: 22 October 2006 Publication History

Abstract

We report our experience in implementing type and memory safety in an efficient manner for sensor network nodes running TinyOS: tiny embedded systems running legacy, C-like code. A compiler for a safe language must often insert dynamic checks into the programs it produces; these generally make programs both larger and slower. In this paper, we describe our novel compiler toolchain, which uses a family of techniques to minimize or avoid these run-time costs. Our results show that safety can in fact be implemented cheaply on low-end 8-bit microcontrollers.

References

[1]
G. Berry. The foundations of Esterel. In Proof, language, and interaction: essays in honour of Robin Milner, pages 425--454. MIT Press, 2001.
[2]
N. Cooprider and J. Regehr. Pluggable abstract domains for analyzing embedded software. In Proc. LCTES, pages 44--53, Ottawa, Canada, June 2006.
[3]
D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler. The nesC language: A holistic approach to networked embedded systems. In Proc. PLDI, pages 1--11, San Diego, CA, June 2003.
[4]
L. Gu and J. A. Stankovic. t-kernel: a translative OS kernel for sensor networks. Technical Report CS-2005-09, Dept. of Computer Science, Univ. of Virginia, 2005.
[5]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors. In Proc. ASPLOS, pages 93--104, Cambridge, MA, Nov. 2000.
[6]
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W Weimer. CCured: Type-safe retrofitting of legacy software. ACM TOPLAS, 27(3):477--526, May 2005.
[7]
G. C. Necula, S. McPeak, S. P. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Proc. Intl. Conf. on Compiler Construction (CC), pages 213--228, Grenoble, France, Apr. 2002.
[8]
J. Regehr, N. Cooprider, W. Archer, and E. Eide. Memory safety and untrusted extensions for TinyOS. Technical Report UUCS-06-007, Univ. of Utah, June 2006.
[9]
R. Rengaswamy, E. Kohler, and M. B. Srivastava. Software based memory protection in sensor nodes. Technical Report TR-UCLA-NESL-200603-01, Networked and Embedded Systems Lab., UCLA, Mar. 2006.
[10]
Sun Microsystems. Java Card Platform Spec. 2.2.2, Mar. 2006. http://java.sun.com/products/javacard/specs.html.
[11]
B. L. Titzer. Virgil: Objects on the head of a pin. In Proc. OOPSLA, Portland, OR, Oct. 2006. To appear.
[12]
B. L. Titzer, D. Lee, and J. Palsberg. Avrora: Scalable sensor network simulation with precise timing. In Proc. IPSN, Los Angeles, CA, Apr. 2005.

Cited By

View all
  • (2021)Integrated Hardware Garbage CollectionACM Transactions on Embedded Computing Systems10.1145/345014720:5(1-25)Online publication date: 9-Jul-2021
  • (2009)Memory Leak Dynamic Monitor Based On HOOK Technique2009 International Conference on Computational Intelligence and Software Engineering10.1109/CISE.2009.5366368(1-4)Online publication date: Dec-2009
  • (2007)Resource management aspects for sensor network softwareProceedings of the 4th workshop on Programming languages and operating systems10.1145/1376789.1376796(1-5)Online publication date: 18-Oct-2007
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
PLOS '06: Proceedings of the 3rd workshop on Programming languages and operating systems: linguistic support for modern operating systems
October 2006
64 pages
ISBN:1595935770
DOI:10.1145/1215995
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2006

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

ASPLOS06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 17 of 32 submissions, 53%

Upcoming Conference

SOSP '25
ACM SIGOPS 31st Symposium on Operating Systems Principles
October 13 - 16, 2025
Seoul , Republic of Korea

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Integrated Hardware Garbage CollectionACM Transactions on Embedded Computing Systems10.1145/345014720:5(1-25)Online publication date: 9-Jul-2021
  • (2009)Memory Leak Dynamic Monitor Based On HOOK Technique2009 International Conference on Computational Intelligence and Software Engineering10.1109/CISE.2009.5366368(1-4)Online publication date: Dec-2009
  • (2007)Resource management aspects for sensor network softwareProceedings of the 4th workshop on Programming languages and operating systems10.1145/1376789.1376796(1-5)Online publication date: 18-Oct-2007
  • (2007)Efficient memory safety for TinyOSProceedings of the 5th international conference on Embedded networked sensor systems10.1145/1322263.1322283(205-218)Online publication date: 6-Nov-2007
  • (2007)Interface contracts for TinyOSProceedings of the 6th international conference on Information processing in sensor networks10.1145/1236360.1236382(158-165)Online publication date: 25-Apr-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media