{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:06:00Z","timestamp":1725537960178},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642046933"},{"type":"electronic","value":"9783642046940"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04694-0_12","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T09:50:17Z","timestamp":1253008217000},"page":"168-183","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Supported Flexible Monitoring: Early Results"],"prefix":"10.1007","author":[{"given":"Atonia","family":"Zhai","sequence":"first","affiliation":[]},{"given":"Guojin","family":"He","sequence":"additional","affiliation":[]},{"given":"Mats P. E.","family":"Heimdahl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"AMD Corporation. Leading the industry: Multi-core technology & dual-core processors from amd (2005), http:\/\/multicore.amd.com\/en\/Technology\/"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Austin, T.M., Breach, S.E., Sohi, G.S.: Efficient detection of all pointer and array access errors. In: ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation, PLDI 1994 (1994)","DOI":"10.1145\/178243.178446"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1181309.1181319","volume-title":"ASID 2006: Proceedings of the 1st workshop on Architectural and system support for improving software dependability","author":"S. Chen","year":"2006","unstructured":"Chen, S., Falsafi, B., Gibbons, P.B., Kozuch, M., Mowry, T.C., Teodorescu, R., Ailamaki, A., Fix, L., Ganger, G.R., Lin, B., Schlosser, S.W.: Log-based architectures for general-purpose monitoring of deployed code. In: ASID 2006: Proceedings of the 1st workshop on Architectural and system support for improving software dependability, pp. 63\u201365. ACM, New York (2006)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Chen, S., Kozuch, M., Strigkos, T., Falsafi, B., Gibbons, P.B., Mowry, T.C., Ramachandran, V., Ruwase, O., Ryan, M., Vlachos, E.: Flexible hardware acceleration for instruction-grain program monitoring. In: 35th Annual International Symposium on Computer Architecture (ISCA 2008) (June 2008)","DOI":"10.1109\/ISCA.2008.20"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/sej.1994.0025","volume":"9","author":"J.J. Chilenski","year":"1994","unstructured":"Chilenski, J.J., Miller, S.P.: Applicability of modified condition\/decision coverage to software testing. Software Engineering Journal\u00a09, 193\u2013200 (1994)","journal-title":"Software Engineering Journal"},{"key":"12_CR6","first-page":"221","volume-title":"MICRO 37: Proceedings of the 37th annual IEEE\/ACM International Symposium on Microarchitecture","author":"J.R. Crandall","year":"2004","unstructured":"Crandall, J.R., Chong, F.T.: Minos: Control data attack prevention orthogonal to memory model. In: MICRO 37: Proceedings of the 37th annual IEEE\/ACM International Symposium on Microarchitecture, Washington, DC, USA, 2004, pp. 221\u2013232. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Dalton, M., Kannan, H., Kozyrakis, C.: Raksha: A flexible information flow architecture for software security. In: 34th Annual International Symposium on Computer Architecture, ISCA 2007 (2007)","DOI":"10.1145\/1250662.1250722"},{"key":"12_CR8","unstructured":"Esterel-Technologies. SCADE Suite product description. (2004), http:\/\/www.esterel-technologies.com\/v2\/scadeSuiteForSafetyCriticalSoftwareDevelopment\/index.html"},{"issue":"2","key":"12_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/2.982916","volume":"35","author":"P.S. Magnusson","year":"2002","unstructured":"Magnusson, P.S., et al.: Simics: A full system simulation platform. IEEE Computer\u00a035(2), 50\u201358 (2002)","journal-title":"IEEE Computer"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Friedrich, J., McCredie, B., James, N., Huott, B., Curran, B., Fluhr, E., Mittal, G., Chan, E., Chan, Y., Plass, D., Chu, S., Le, H., Clark, L., Ripley, J., Taylor, S., Dilullo, J., Lanzerotti, M.: Design of the POWER6(TM) Microprocessor. In: 2007 IEEE International Solid-State Circuits Conference (February 2007)","DOI":"10.1109\/ISSCC.2007.373605"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/32.54292","volume":"16","author":"D. Harel","year":"1990","unstructured":"Harel, D., Lachover, H., Naamad, A., Pnueli, A., Politi, M., Sherman, R., Shtull-Trauring, A., Trakhtenbrot, M.: Statemate: A working environment for the development of complex reactive systems. IEEE Transactions on Software Engineering\u00a016(4), 403\u2013414 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR12","unstructured":"Hastings, R., Joyce, B.: Purify: Fast detection of memory leaks and access errors. In: The Winter 1992 USENIX Conference, San Francisco, California, pp. 125\u2013138 (1991)"},{"key":"12_CR13","unstructured":"He, G., Zhai, A., Yew, P.-C.: Ex-mon: An architectural framework for dynamic program monitoring on multicore processors. In: The Twelfth Workshop on Interaction between Compilers and Computer Architectures, Interact-12 (2008)"},{"key":"12_CR14","unstructured":"Intel Corporation. Intel\u2019s dual-core processor for desktop PCs (2005), http:\/\/www.intel.com\/personal\/desktopcomputer\/dual_core\/index.htm"},{"key":"12_CR15","unstructured":"Intel Corporation. Intel itanium architecture software developer\u2019s manual, revision 2.2 (2006), http:\/\/www.intel.com\/design\/itanium\/manuals\/iiasdmanual.htm"},{"key":"12_CR16","unstructured":"Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation (PLDI 2005) (June 2005)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Martin, M.M.K., Sorin, D.J., Beckmann, B.M., Marty, M.R., Xu, M., Alameldeen, A.R., Moore, K.E., Hill, M.D., Wood, D.A.: Multifacet\u2019s general execution-driven multiprocessor simulator (gems) toolset. Computer Architecture News (2005)","DOI":"10.1145\/1105734.1105747"},{"key":"12_CR18","unstructured":"Mathworks Inc. Simulink product web site. Via the world-wide-web: http:\/\/www.mathworks.com\/products\/simulink"},{"key":"12_CR19","unstructured":"Mathworks Inc. Stateflow product web site. Via the world-wide-web: http:\/\/www.mathworks.com"},{"issue":"4","key":"12_CR20","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10009-004-0173-6","volume":"8","author":"S.P. Miller","year":"2006","unstructured":"Miller, S.P., Tribble, A.C., Whalen, M.W., Heimdahl, M.P.E.: Proving the shalls: Early validation of requirements through formal methods. Int. J. Softw. Tools Technol. Transf.\u00a08(4), 303\u2013319 (2006)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"ECOOP 2003 - Object-Oriented Programming","author":"N. Mitchell","year":"2003","unstructured":"Mitchell, N., Sevitsky, G.: LeakBot: An automated and lightweight tool for diagnosing memory leaks in large Java applications. In: Cardelli, L. (ed.) ECOOP 2003. LNCS, vol.\u00a02743. Springer, Heidelberg (2003)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: How to shadow every byte of memory used by a program. In: The Third International ACM SIGPLAN\/SIGOPS Conference on Virtual Execution Environments (VEE 2007), San Diego, California, USA (June 2007)","DOI":"10.1145\/1254810.1254820"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: A framework for heavyweight dynamic binary instrumentation. In: ACM SIGPLAN 2007 Conference on Programming Language Design and Implementation (PLDI 2007), San Diego, California, USA (June 2007)","DOI":"10.1145\/1250734.1250746"},{"key":"12_CR24","unstructured":"The NuSMV Toolset (2005), http:\/\/nusmv.irst.itc.it\/"},{"key":"12_CR25","volume-title":"Software Test and Analysis: Process, Principles, and Techniques","author":"M. Pezze","year":"2006","unstructured":"Pezze, M., Young, M.: Software Test and Analysis: Process, Principles, and Techniques. John Wiley and Sons, Chichester (2006)"},{"key":"12_CR26","unstructured":"Qin, F., Lu, S., Zhou, Y.: Safemem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs. In: 11th International Symposium on High-Performance Computer Architecture (HPCA-11) (February 2005)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H.-s., Zhou, Y., Wu, Y.: Lift: A low-overhead practical information flow tracking system for detecting security attacks. In: 39th Annual IEEE\/ACM International Symposium on Microarchitecture, 2006. MICRO-39, December 2006, pp. 135\u2013148 (2006)","DOI":"10.1109\/MICRO.2006.29"},{"key":"12_CR28","unstructured":"RTCA. DO-178B: Software Consideration. In: Airborne Systems and Equipment Certification. RTCA (1992)"},{"key":"12_CR29","unstructured":"Seward, J., Nethercote, N.: Using valgrind to detect undefined value errors with bit-precision. In: The USENIX 2005 Annual Technical Conference, Anaheim, California, USA (April 2005)"},{"issue":"2\/3","key":"12_CR30","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1147\/rd.502.0261","volume":"50","author":"R. Shetty","year":"2006","unstructured":"Shetty, R., Kharbutli, M., Solihin, Y., Prvulovic, M.: Heapmon: a helper-thread approach to programmable, automatic, and low-overhead memory bug detection. IBM J. Res. Dev.\u00a050(2\/3), 261\u2013275 (2006)","journal-title":"IBM J. Res. Dev."},{"key":"12_CR31","unstructured":"Standard Performance Evaluation Corporation. The SPEC Benchmark Suite, http:\/\/www.specbench.org"},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1024393.1024404","volume-title":"ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems","author":"G.E. Suh","year":"2004","unstructured":"Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pp. 85\u201396. ACM, New York (2004)"},{"key":"12_CR33","unstructured":"Sun Corporation. Throughput computing\u2014niagara (2005), http:\/\/www.sun.com\/processors\/throughput\/"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Venkataramani, G., Doudalis, I., Solihin, Y., Prvulovic, M.: Flexitaint: A programmable accelerator for dynamic taint propagation. In: 14th International Symposium on High-Performance Computer Architecture (HPCA-14) (February 2008)","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Venkataramani, G., Roemer, B., Solihin, Y., Prvulovic, M.: Memtracker: Efficient and programmable support for memory access monitoring and debugging. In: 13th International Symposium on High-Performance Computer Architecture (HPCA-13) (February 2007)","DOI":"10.1109\/HPCA.2007.346205"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, P., Qin, F., Liu, W., Zhou, Y., Torrellas, J.: iwatcher: Simple, general architectural support for software debugging. In: 31st Annual International Symposium on Computer Architecture, ISCA 2004 (2004)","DOI":"10.1109\/ISCA.2004.1310777"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04694-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:52:58Z","timestamp":1558540378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04694-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642046933","9783642046940"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04694-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}