{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:30:47Z","timestamp":1757539847586,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_121","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T06:22:45Z","timestamp":1513664565000},"page":"756-765","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Maximum Stack Memory Monitoring Method Assisted by Static Analysis of the Stack Usage Profile"],"prefix":"10.1007","author":[{"given":"Kiho","family":"Choi","sequence":"first","affiliation":[]},{"given":"Seongseop","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Moon Gi","family":"Seok","sequence":"additional","affiliation":[]},{"given":"Jeonghun","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Daejin","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"121_CR1","doi-asserted-by":"crossref","unstructured":"Brylow, D., Damgaard, N., Palsberg, J.: Static checking of interrupt-driven software. In: Proceedings of the 23rd International Conference on Software, ICSE 2001, pp. 47\u201356 (2001)","DOI":"10.1109\/ICSE.2001.919080"},{"key":"121_CR2","doi-asserted-by":"crossref","unstructured":"Chatterjee, K., Ma, D., Majumdar, R., Zhao, T., Henzinger, T.A., Palsberg, J.: Stack size analysis for interrupt-driven programs. In: Proceedings of the 10th International Conference on Static Analysis, pp. 109\u2013126 (2003)","DOI":"10.1007\/3-540-44898-5_7"},{"key":"121_CR3","doi-asserted-by":"crossref","unstructured":"Eslamimehr, M., Palsberg, J.: Testing versus static analysis of maximum stack size. In: 37th Annual Computer Software and Applications Conference. IEEE, pp. 619\u2013626 (2013)","DOI":"10.1109\/COMPSAC.2013.100"},{"key":"121_CR4","doi-asserted-by":"crossref","unstructured":"Brylow, D., Damgaard, N., Palsberg, J.: Static checking of interrupt-driven software. In: Proceedings of ICSE 2001, 23rd International Conference on Software Engineering, Toronto, pp. 47\u201356 (2001)","DOI":"10.1109\/ICSE.2001.919080"},{"key":"121_CR5","doi-asserted-by":"crossref","unstructured":"Regehr, J.: Random testing of interrupt-driven software. In: ACM International Conference On Embedded Software, pp. 290\u2013298 (2005)","DOI":"10.1145\/1086228.1086282"},{"key":"121_CR6","unstructured":"http:\/\/catless.ncl.ac.uk\/Risks\/16.93.html#subj"},{"key":"121_CR7","unstructured":"http:\/\/www.edn.com\/design\/automotive\/4423428\/Toyota-s-killer-firmware\u2013Bad-design-and-its-consequences"},{"key":"121_CR8","doi-asserted-by":"crossref","unstructured":"Regehr, J., Reid, A., Webb, K.: Eliminating stack overflow by abstract interpretation. In: Proceedings of EMSOFT 2003, Third International Conference on Embedded Software, pp. 306\u2013322 (2003)","DOI":"10.1007\/978-3-540-45212-6_20"},{"key":"121_CR9","doi-asserted-by":"crossref","unstructured":"Regehr, J., Reid, A.: HOIST: a system for automaticallyderiving static analyzers for embedded systems. In: ACM SIGARCH Computer Architecture News (2004)","DOI":"10.1145\/1024393.1024410"},{"key":"121_CR10","unstructured":"http:\/\/refspecs.linuxbase.org\/elf\/elf.pdf"},{"key":"121_CR11","unstructured":"Choi, K., Cho, J., Park, D.: Zynq-based ARM-FPGA Cooperative Platform for Maximum Stack Usage Analysis in Embedded Systems. In: Proceeding of COOLChips (2017)"},{"key":"121_CR12","volume-title":"Open Sources: Voices from the Open Source Revolution","author":"C DiBona","year":"1999","unstructured":"DiBona, C., Ockman, S., Stone, M.: Open Sources: Voices from the Open Source Revolution. O\u2019reilly, Sebastopol (1999)"},{"key":"121_CR13","unstructured":"Mehlhorn, K., Naher, S., Sanders, P.: Engineering DFS-based graph algorithm. Partially supported by DFG grant SA 933\/3\u20131 (2007)"},{"key":"121_CR14","unstructured":"http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.100166_0001_00_en\/arm_cortexm4_processor_trm_100166_0001_00_en.pdf"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T12:51:23Z","timestamp":1533387083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_121","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}