Changes in directory llvm-www/pubs:

2005-09-25-CASES05-SegmentProtection.html added (r1.1)
2005-09-25-CASES05-SegmentProtection.pdf added (r1.1)
index.html updated: 1.23 -> 1.24
---
Log message:

add a new paper that uses LLVM


---
Diffs of the changes:  (+67 -0)

 2005-09-25-CASES05-SegmentProtection.html |   60 ++++++++++++++++++++++++++++++
 2005-09-25-CASES05-SegmentProtection.pdf  |    0 
 index.html                                |    7 +++
 3 files changed, 67 insertions(+)


Index: llvm-www/pubs/2005-09-25-CASES05-SegmentProtection.html
diff -c /dev/null llvm-www/pubs/2005-09-25-CASES05-SegmentProtection.html:1.1
*** /dev/null   Sat Oct 22 16:16:20 2005
--- llvm-www/pubs/2005-09-25-CASES05-SegmentProtection.html     Sat Oct 22 
16:16:10 2005
***************
*** 0 ****
--- 1,60 ----
+ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
+ <html>
+ <head>
+   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+   <link rel="stylesheet" href="../llvm.css" type="text/css" media="screen" />
+   <title>Segment Protection for Embedded Systems Using Run-time Checks</title>
+ </head>
+ <body>
+ 
+ <div class="pub_title">
+   Segment Protection for Embedded Systems Using Run-time Checks
+ </div>
+ <div class="pub_author">
+   Matthew Simpson, Bhuvan Middha and Rajeev Barua
+ </div>
+ 
+ 
+ <h2>Abstract:</h2>
+ <blockquote>
+ 
+ <p>The lack of virtual memory protection is a serious source of unreliability 
in many embedded systems. Without the segment-level 
+ protection it provides, these systems are subject to memory access 
+ violations, stemming from programmer error, whose results can be 
+ dangerous and catastrophic in safety-critical systems. The traditional method 
of testing embedded software before its deployment 
+ is an insufficient means of detecting and debugging all software 
+ errors, and the reliance on this practice is a severe gamble when 
+ the reliable performance of the embedded device is critical. Additionally, 
the use of safe languages and programming semantic restrictions as prevention 
mechanisms is often infeasible when considering the adoptability and 
compatibility of these languages since 
+ most embedded applications are written in C and C++.</p>
+ 
+ <p>This work improves system reliability by providing a completely 
+ automatic software technique for guaranteeing segment protection 
+ for embedded systems lacking virtual memory. This is done by 
+ inserting optimized run-time checks before memory accesses that 
+ detect segmentation violations in cases in which there would otherwise be no 
error, enabling remedial action before system failure 
+ or corruption. This feature is invaluable for safety-critical embedded 
systems. Other advantages of our method include its low overhead, lack of any 
programming language or semantic restrictions, 
+ and ease of implementation. Our compile-time analysis, known as 
+ intended segment analysis, is a uniquely structured analysis that allows for 
the realization of optimizations used to reduce the number 
+ of required run-time checks and foster our technique into a truly 
+ viable solution for providing segment protection in embedded systems lacking 
virtual memory. </p>
+ <p>Our experimental results show that these optimizations are effective at 
reducing the performance overheads associated with providing software segment 
protection to low, and in many cases, negligible levels. For the eight 
evaluated embedded benchmarks, the 
+ average increase in run-time is 0.72%, the average increase in energy 
consumption is 0.44%, and the average increase in code size 
+ is 3.60%. </p>
+ </blockquote>
+ 
+ <h2>Published:</h2>
+ <blockquote>
+   "Segment Protection for Embedded Systems Using Run-time Checks"<br>
+   By Matthew Simpson, Bhuvan Middha and Rajeev Barua.<br>
+   <i>Proceedings of the ACM International Conference on Compilers, <br>
+   Architecture, and Synthesis for Embedded Systems (CASES)</i>,<br>
+   San Francisco, CA, September 25-27, 2005<br>
+ </blockquote>
+ 
+ <h2>Download:</h2>
+ <ul>
+   <li><a href="2005-09-25-CASES05-SegmentProtection.pdf">Segment Protection 
for Embedded Systems Using Run-time Checks</a> (PDF)</li>
+ </ul>
+ 
+ </body>
+ </html>


Index: llvm-www/pubs/2005-09-25-CASES05-SegmentProtection.pdf


Index: llvm-www/pubs/index.html
diff -u llvm-www/pubs/index.html:1.23 llvm-www/pubs/index.html:1.24
--- llvm-www/pubs/index.html:1.23       Fri Jun 24 22:02:17 2005
+++ llvm-www/pubs/index.html    Sat Oct 22 16:16:10 2005
@@ -48,6 +48,13 @@
 
 <ol>
 
+<li>"<a href="2005-09-25-CASES05-SegmentProtection.html">Segment Protection for
+  Embedded Systems Using Run-time Checks"<br>
+  By Matthew Simpson, Bhuvan Middha and Rajeev Barua.<br>
+  <i>Proceedings of the ACM International Conference on Compilers,
+  Architecture, and Synthesis for Embedded Systems (CASES)</i>,
+  San Francisco, CA, September, 2005</li>
+  
 <li>"<a href="2005-06-17-LattnerMSThesis.html">An Implementation of Swing 
Modulo Scheduling with Extensions for Superblocks</a>"<br>
 Tanya M. Lattner. <i>M.S. Thesis</i>, <a href="http://www.cs.uiuc.edu";>Computer
 Science Dept.</a>, <a href="http://www.uiuc.edu/";>University of Illinois at



_______________________________________________
llvm-commits mailing list
[EMAIL PROTECTED]
http://lists.cs.uiuc.edu/mailman/listinfo/llvm-commits

Reply via email to