{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T20:32:56Z","timestamp":1774384376233,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032214225","type":"print"},{"value":"9783032214232","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-21423-2_18","type":"book-chapter","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:01:11Z","timestamp":1774371671000},"page":"257-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Provably Relevant HAL Interface Requirements for\u00a0Embedded Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4794-958X","authenticated-orcid":false,"given":"Manuel","family":"Bentele","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2540-9489","authenticated-orcid":false,"given":"Andreas","family":"Podelski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0878-2919","authenticated-orcid":false,"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6824-0567","authenticated-orcid":false,"given":"Bernd","family":"Westphal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,25]]},"reference":[{"issue":"3","key":"18_CR1","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/tse.2012.41","volume":"39","author":"D Alrajeh","year":"2013","unstructured":"Alrajeh, D., Kramer, J., Russo, A., Uchitel, S.: Elaborating requirements using model checking and inductive learning. Trans. Softw. Eng. 39(3), 361\u2013383 (2013). https:\/\/doi.org\/10.1109\/tse.2012.41","journal-title":"Trans. Softw. Eng."},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/1047659.1040314","volume":"40","author":"R Alur","year":"2005","unstructured":"Alur, R., \u010cern\u00fd, P., Madhusudan, P., Nam, W.: Synthesis of interface specifications for Java classes. SIGPLAN Notices 40(1), 98\u2013109 (2005). https:\/\/doi.org\/10.1145\/1047659.1040314","journal-title":"SIGPLAN Notices"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Amann, S., Nadi, S., Nguyen, H.A., Nguyen, T.N., Mezini, M.: MUBench: a benchmark for API-misuse detectors. In: Proceedings of MSR, pp. 464\u2013467. ACM (2016). https:\/\/doi.org\/10.1145\/2901739.2903506","DOI":"10.1145\/2901739.2903506"},{"issue":"12","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1109\/tse.2018.2827384","volume":"45","author":"S Amann","year":"2019","unstructured":"Amann, S., Nguyen, H.A., Nadi, S., Nguyen, T.N., Mezini, M.: A systematic evaluation of static API-misuse detectors. Trans. Softw. Eng. 45(12), 1170\u20131188 (2019). https:\/\/doi.org\/10.1109\/tse.2018.2827384","journal-title":"Trans. Softw. Eng."},{"key":"18_CR5","unstructured":"Baudin, P., et al.: ACSL: ANSI\/ISO C\u00a0Specification Language. Frama-C (2024). https:\/\/frama-c.com\/download\/acsl-1.20.pdf, version 1.20"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Bentele, M., Podelski, A., Sikora, A., Westphal, B.: Replication dataset for provably relevant HAL interface requirements for embedded systems. Replication package (2026). https:\/\/doi.org\/10.5281\/zenodo.17441552","DOI":"10.5281\/zenodo.17441552"},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Beyer, D., Henzinger, T.A., Singh, V.: Algorithms for interface synthesis. In: Proceedings of CAV, pp. 4\u201319. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-540-73368-3_4","DOI":"10.1007\/978-3-540-73368-3_4"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Degiovanni, R., Alrajeh, D., Aguirre, N., Uchitel, S.: Automated goal operationalisation based on interpolation and SAT solving. In: Proceedings of ICSE, pp. 129\u2013139. ACM (2014). https:\/\/doi.org\/10.1145\/2568225.2568323","DOI":"10.1145\/2568225.2568323"},{"key":"18_CR9","doi-asserted-by":"publisher","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of ICSE, pp. 411\u2013420. ACM (1999). https:\/\/doi.org\/10.1145\/302405.302672","DOI":"10.1145\/302405.302672"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Heizmann, M., et al.: Ultimate Automizer and the search for perfect interpolants (competition contribution). In: Proceedings of TACAS, pp. 447\u2013451. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-89963-3_30","DOI":"10.1007\/978-3-319-89963-3_30"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Heizmann, M., Hoenicke, J., Podelski, A.: Software model checking for people who love automata. In: Proceedings of CAV, pp. 36\u201352. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_2","DOI":"10.1007\/978-3-642-39799-8_2"},{"key":"18_CR12","doi-asserted-by":"publisher","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R.: Permissive interfaces. Softw. Eng. Notes 30(5), 31\u201340 (2005). https:\/\/doi.org\/10.1145\/1095430.1081713","DOI":"10.1145\/1095430.1081713"},{"key":"18_CR13","unstructured":"Hill, S.C., Jelemensky, J., Heene, M.R., Groves, S.E., DeBrito, D.N.: Queued serial peripheral interface for use in a data processing system. Patent\u00a0US-4958277 (1990). https:\/\/image-ppubs.uspto.gov\/dirsearch-public\/print\/downloadPdf\/4958277"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"Palma, F., Susi, A., Tonella, P.: Using an SMT solver for interactive requirements prioritization. In: Proceedings of ESEC\/FSE, pp. 48\u201358. ACM (2011). https:\/\/doi.org\/10.1145\/2025113.2025124","DOI":"10.1145\/2025113.2025124"},{"key":"18_CR15","unstructured":"SPI connection between RPi and ATmega32. Raspberry\u00a0Pi Forum (2016). https:\/\/forums.raspberrypi.com\/viewtopic.php?p=881605"},{"key":"18_CR16","unstructured":"Reading values from MCP3002 not working [...]. Raspberry\u00a0Pi Forum (2019). https:\/\/forums.raspberrypi.com\/viewtopic.php?t=230569"},{"key":"18_CR17","unstructured":"spidev sanity check not working. Stack Exchange (2019). https:\/\/raspberrypi.stackexchange.com\/questions\/102286\/spidev-sanity-check-not-working"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-21423-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:01:16Z","timestamp":1774371676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-21423-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032214225","9783032214232"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-21423-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"25 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no competing interests that could have appeared to influence the work reported in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poznan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2026.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}