{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:03Z","timestamp":1759331823730,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030888053"},{"type":"electronic","value":"9783030888060"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88806-0_5","type":"book-chapter","created":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T17:25:06Z","timestamp":1634145906000},"page":"102-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Static Analysis of Endian Portability by Abstract Interpretation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9236-9870","authenticated-orcid":false,"given":"David","family":"Delmas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7248-5914","authenticated-orcid":false,"given":"Abdelraouf","family":"Ouadjaout","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6375-3179","authenticated-orcid":false,"given":"Antoine","family":"Min\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,13]]},"reference":[{"unstructured":"DO-331: Model-based development and verification supplement to DO-178C and DO-278A (2011)","key":"5_CR1"},{"unstructured":"AT & T, The Santa Cruz Operation Inc.: System V application binary interface (1997)","key":"5_CR2"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-1-4020-6254-4_2","volume-title":"Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems","author":"G Berry","year":"2007","unstructured":"Berry, G.: SCADE: synchronous design and validation of embedded control software. In: Ramesh, S., Sampath, P. (eds.) Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems, pp. 19\u201333. Springer, Dordrecht (2007). https:\/\/doi.org\/10.1007\/978-1-4020-6254-4_2"},{"unstructured":"Brahmi, A., Delmas, D., Essoussi, M.H., Randimbivololona, F., Atki, A., Marie, T.: Formalise to automate: deployment of a safe and cost-efficient process for avionics software. In: 9th European Congress on Embedded Real Time Software and Systems (ERTS 2018), Toulouse, France, January 2018. https:\/\/hal.archives-ouvertes.fr\/hal-01708332","key":"5_CR4"},{"unstructured":"Brevnov, E., Domeika, M., Loenko, M., Ozhdikhin, P., Tang, X., Willkinson, H.: BEC: bi-endian compiler technology for porting byte order sensitive applications 16(1), 42\u201361 (2012)","key":"5_CR5"},{"unstructured":"Brown, N.: Sparse: a look under the hood (2016). https:\/\/lwn.net\/Articles\/689907\/","key":"5_CR6"},{"unstructured":"Chevalier, M.: Proving the security of software-intensive embedded systems by abstract interpretation. Ph.D. thesis, Universit\u00e9 PSL, November 2020","key":"5_CR7"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-030-39322-9_8","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"M Chevalier","year":"2020","unstructured":"Chevalier, M., Feret, J.: Sharing ghost variables in a collection of abstract domains. In: Beyer, D., Zufferey, D. (eds.) VMCAI 2020. LNCS, vol. 11990, pp. 158\u2013179. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39322-9_8"},{"issue":"10","key":"5_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/C-M.1981.220208","volume":"14","author":"D Cohen","year":"1981","unstructured":"Cohen, D.: On holy wars and a plea for peace. Computer 14(10), 48\u201354 (1981). https:\/\/doi.org\/10.1109\/C-M.1981.220208","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL 1977, pp. 238\u2013252. ACM, January 1977","key":"5_CR10","DOI":"10.1145\/512950.512973"},{"doi-asserted-by":"crossref","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: POPL 1978, pp. 84\u201397. ACM (1978)","key":"5_CR11","DOI":"10.1145\/512760.512770"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-540-74061-2_27","volume-title":"Static Analysis","author":"D Delmas","year":"2007","unstructured":"Delmas, D., Souyris, J.: Astr\u00e9e: from research to industry. In: Nielson, H.R., Fil\u00e9, G. (eds.) SAS 2007. LNCS, vol. 4634, pp. 437\u2013451. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74061-2_27"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-04570-7_6","volume-title":"Formal Methods for Industrial Critical Systems","author":"D Delmas","year":"2009","unstructured":"Delmas, D., Goubault, E., Putot, S., Souyris, J., Tekkal, K., V\u00e9drine, F.: Towards an industrial use of FLUCTUAT on safety-critical avionics software. In: Alpuente, M., Cook, B., Joubert, C. (eds.) FMICS 2009. LNCS, vol. 5825, pp. 53\u201369. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04570-7_6"},{"doi-asserted-by":"crossref","unstructured":"Delmas, D., Min\u00e9, A.: Analysis of program differences with numerical abstract interpretation. In: PERR 2019, Prague, Czech Republic, April 2019","key":"5_CR14","DOI":"10.1007\/978-3-030-32304-2_12"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-030-32304-2_12","volume-title":"Static Analysis","author":"D Delmas","year":"2019","unstructured":"Delmas, D., Min\u00e9, A.: Analysis of software patches using numerical abstract interpretation. In: Chang, B.-Y.E. (ed.) SAS 2019. LNCS, vol. 11822, pp. 225\u2013246. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32304-2_12"},{"doi-asserted-by":"publisher","unstructured":"Delmas, D., Ouadjaout, A., Min\u00e9, A.: Artifact for static analysis of endian portability by abstract. Interpretation (2021). https:\/\/doi.org\/10.5281\/zenodo.5206794","key":"5_CR16","DOI":"10.5281\/zenodo.5206794"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/00207168908803778","volume":"30","author":"P Granger","year":"1989","unstructured":"Granger, P.: Static analysis of arithmetic congruences. Int. J. Comput. Math. 30, 165\u2013199 (1989)","journal-title":"Int. J. Comput. Math."},{"doi-asserted-by":"crossref","unstructured":"Gross, J., Ganga, I., Sridhar, T.: Geneve: generic network virtualization encapsulation. RFC 8926, RFC Editor, November 2020","key":"5_CR18","DOI":"10.17487\/RFC8926"},{"unstructured":"ISO\/IEC JTC1\/SC22\/WG14 working group: C standard. Technical report 1124, ISO & IEC (2007)","key":"5_CR19"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-41600-3_1","volume-title":"Verified Software. Theories, Tools, and Experiments","author":"M Journault","year":"2020","unstructured":"Journault, M., Min\u00e9, A., Monat, R., Ouadjaout, A.: Combinations of reusable abstract domains for a multilingual static analyzer. In: Chakraborty, S., Navas, J.A. (eds.) VSTTE 2019. LNCS, vol. 12031, pp. 1\u201318. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41600-3_1"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-030-45237-7_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R K\u00e1pl","year":"2020","unstructured":"K\u00e1pl, R., Par\u00edzek, P.: Endicheck: dynamic analysis for detecting endianness bugs. In: TACAS 2020. LNCS, vol. 12079, pp. 254\u2013270. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45237-7_15"},{"unstructured":"Mahameed, S.: Mellanox, mlx5 RDMA net device support (2017). https:\/\/lwn.net\/Articles\/720074\/","key":"5_CR22"},{"unstructured":"Mellanox Technologies: mlx5 core library (2020). https:\/\/github.com\/torvalds\/linux\/tree\/master\/drivers\/net\/ethernet\/mellanox\/mlx5\/core","key":"5_CR23"},{"doi-asserted-by":"crossref","unstructured":"Min\u00e9, A.: Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics. In: Proceedings of the ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2006), pp. 54\u201363. ACM, June 2006","key":"5_CR24","DOI":"10.1145\/1159974.1134659"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11609773_23","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"A Min\u00e9","year":"2005","unstructured":"Min\u00e9, A.: Symbolic methods to enhance the precision of numerical abstract domains. In: Emerson, E.A., Namjoshi, K.S. (eds.) VMCAI 2006. LNCS, vol. 3855, pp. 348\u2013363. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11609773_23"},{"unstructured":"Min\u00e9, A.: Abstract domains for bit-level machine integer and floating-point operations. In: Proceedings of the 4th International Workshop on Invariant Generation (WING 2012), p. 16. No. HW-MACS-TR-0097, Computer Science, School of Mathematical and Computer Science, Heriot-Watt University, UK, June 2012","key":"5_CR26"},{"unstructured":"Min\u00e9, A.: Static analysis by abstract interpretation of concurrent programs. Technical report, \u00c9cole normale sup\u00e9rieure, May 2013","key":"5_CR27"},{"doi-asserted-by":"crossref","unstructured":"Min\u00e9, A., Delmas, D.: Towards an industrial use of sound static analysis for the verification of concurrent embedded avionics software. In: Proceedings of the 15th International Conference on Embedded Software (EMSOFT 2015), pp. 65\u201374. IEEE CS Press, October 2015","key":"5_CR28","DOI":"10.1109\/EMSOFT.2015.7318261"},{"unstructured":"Min\u00e9, A., Ouadjaout, A., Journault, M.: Design of a modular platform for static analysis. In: The Ninth Workshop on Tools for Automatic Program Analysis (TAPAS 2018), Fribourg-en-Brisgau, Germany, August 2018. https:\/\/hal.sorbonne-universite.fr\/hal-01870001","key":"5_CR29"},{"key":"5_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-540-78791-4_6","volume-title":"Compiler Construction","author":"M Nita","year":"2008","unstructured":"Nita, M., Grossman, D.: Automatic transformation of bit-level C code to support multiple equivalent data layouts. In: Hendren, L. (ed.) CC 2008. LNCS, vol. 4959, pp. 85\u201399. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78791-4_6"},{"unstructured":"Red Hat Inc: Generic network virtualization encapsulation (2017). https:\/\/github.com\/torvalds\/linux\/blob\/master\/drivers\/net\/geneve.c","key":"5_CR31"},{"unstructured":"S.C of RTCA: DO-178C: Software considerations in airborne systems and equipment certification (2011)","key":"5_CR32"},{"doi-asserted-by":"crossref","unstructured":"Souyris, J., Wiels, V., Delmas, D., Delseny, H.: Formal verification of avionics software products, pp. 532\u2013546 (2009)","key":"5_CR33","DOI":"10.1007\/978-3-642-05089-3_34"},{"unstructured":"The LineageOS Project: Lineageos (2020). https:\/\/github.com\/LineageOS\/","key":"5_CR34"},{"unstructured":"The Squashfs Project: Squashfs (2020). https:\/\/github.com\/LineageOS\/android_kernel_sony_msm8960t\/tree\/lineage-18.1\/fs\/squashfs","key":"5_CR35"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88806-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T02:41:30Z","timestamp":1673491290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88806-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030888053","9783030888060"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88806-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"13 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Static Analysis Symposium","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chicago, IL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sas2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/staticanalysis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}