{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:28:22Z","timestamp":1768314502561,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T00:00:00Z","timestamp":1763942400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,24]]},"DOI":"10.1109\/dsa66321.2025.00027","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:20Z","timestamp":1768242020000},"page":"144-155","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis Methodology for Implicit Interfaces in Safety-Critical Embedded Software: Theory and Application"],"prefix":"10.1109","author":[{"given":"Jiawei","family":"Ding","sequence":"first","affiliation":[{"name":"Beihang University,Beijing,China"}]},{"given":"Xiaohong","family":"Bao","sequence":"additional","affiliation":[{"name":"Beihang University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8179.001.0001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2017.4041349"},{"key":"ref3","article-title":"RTOS 101 - Priority inversion (Mars Pathfinder case)","volume-title":"Blog post","author":"Percepio","year":"2023"},{"issue":"3","key":"ref4","first-page":"219","article-title":"An introduction to input\/output automata","volume":"2","author":"Lynch","year":"1989","journal-title":"CWI Quarterly"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/503271.503226"},{"key":"ref6","first-page":"1","article-title":"Interface theory for input\/output automata","volume":"281","author":"Lynch","year":"2003","journal-title":"Theor. Comput. Sci."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.18280\/ijsse.110606"},{"key":"ref8","first-page":"1","article-title":"Interface automata for shared memory (extended)","volume":"61","author":"Schinko","year":"2024","journal-title":"Acta Informatica"},{"key":"ref9","year":"2024","journal-title":"AUTOSAR Technical Overview (Release 22\u201311)"},{"key":"ref10","volume-title":"DO-178C: Software Considerations in Airborne Systems and Equipment Certification","year":"2012"},{"key":"ref11","volume-title":"Zephyr devicetree bindings (v3.5)","year":"2025"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/wpc.2001.921739"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2006.103"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3406929"},{"issue":"107156","key":"ref15","article-title":"Evolution patterns of architecture smells","volume":"159","author":"Koulouri","year":"2023","journal-title":"Inf. Softw. Technol."},{"key":"ref16","article-title":"DepsRAG: LLM-based reasoning over hidden software dependencies","author":"Sarkar","year":"2025","journal-title":"arXiv preprint"},{"issue":"PLDI","key":"ref17","article-title":"Sound static data-race verification for C","volume-title":"Proc. ACM Program. Lang.","volume":"9","author":"Kruse","year":"2025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"ref19","article-title":"ThreadSanitizer - Clang 13 documentation","volume-title":"Google LLC","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9919.003.0003"},{"key":"ref21","article-title":"Interface FMEA: anticipating failures in software integration","volume-title":"Technical Report","author":"Ozarin","year":"2009"},{"key":"ref22","first-page":"263","article-title":"Hidden interface dependencies in large-scale embedded software","volume":"46","author":"Yu","year":"2016","journal-title":"Microprocess. Microsyst"},{"key":"ref23","article-title":"CVE-2021\u201326708: Linux kernel netfilter local privilege escalation","year":"2021","journal-title":"National Vulnerability Database"},{"key":"ref24","year":"2021","journal-title":"AUTOSAR specification of operating system (Release 21\u201311)"},{"key":"ref25","article-title":"ISO\/IEC\/IEEE","year":"2017","journal-title":"ISO\/IEC\/IEEE 12207:2017 Systems and software engineering - Software life cycle processes. ISO, Geneva"},{"issue":"3","key":"ref26","first-page":"1627","article-title":"Analyzing TCP race conditions in real-time embedded networks","volume":"20","author":"Holland","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"521556","key":"ref27","article-title":"Interface automata for shared memory","volume":"59","author":"Schinko","year":"2022","journal-title":"Acta Informatica"},{"issue":"110562","key":"ref28","article-title":"An empirical study of software interface faults","volume":"165","author":"Zhang","year":"2020","journal-title":"J. Syst. Softw."},{"key":"ref29","first-page":"191","article-title":"On data-integrity errors due to interface misuse in embedded software","volume":"169","author":"Natella","year":"2018","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref30","article-title":"Mars Climate Orbiter mishap investigation board: Phase I report","author":"Stephenson","year":"1999","journal-title":"NASA, Washington (DC)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8237-7"}],"event":{"name":"2025 12th International Conference on Dependable Systems and Their Applications (DSA)","location":"Sharjah, United Arab Emirates","start":{"date-parts":[[2025,11,24]]},"end":{"date-parts":[[2025,11,26]]}},"container-title":["2025 12th International Conference on Dependable Systems and Their Applications (DSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11320275\/11320347\/11320367.pdf?arnumber=11320367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:37:13Z","timestamp":1768293433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11320367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,24]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/dsa66321.2025.00027","relation":{},"subject":[],"published":{"date-parts":[[2025,11,24]]}}}