{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:55:05Z","timestamp":1755838505072},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/rtas.2016.7461326","type":"proceedings-article","created":{"date-parts":[[2016,4,28]],"date-time":"2016-04-28T20:18:27Z","timestamp":1461874707000},"page":"1-11","source":"Crossref","is-referenced-by-count":14,"title":["Complete, High-Assurance Determination of Loop Bounds and Infeasible Paths for WCET Analysis"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Sewell","sequence":"first","affiliation":[]},{"given":"Felix","family":"Kam","sequence":"additional","affiliation":[]},{"given":"Gernot","family":"Heiser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190234"},{"key":"ref38","first-page":"325","author":"sewell","year":"2011","journal-title":"Sel4 enforces integrity"},{"journal-title":"DO-178B Software Considerations in Airborne Systems and Equipment Certification","article-title":"RTCA","year":"1992","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/WISES.2008.4623310"},{"journal-title":"Isabelle\/HOL - A Proof Assistant for Higher-Order Logic","year":"2002","author":"nipkow","key":"ref31"},{"journal-title":"Common Criteria for IT Security Evaluation","year":"1999","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71067-7_6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462183"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509513"},{"journal-title":"DO-178C Software Considerations in Airborne Systems and Equipment Certification","article-title":"RTCA","year":"2011","key":"ref34"},{"key":"ref10","article-title":"Data-flow based detection of loop bounds","author":"cullmann","year":"2007","journal-title":"7th WS Worst-Case Execution-Time Analysis"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"ref11","first-page":"760","article-title":"Understanding integer overflow in C\/C++","author":"dietz","year":"2012","journal-title":"ICSE '12 Proceedings of the 34th International Conference on Software Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522720"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45449-7_32"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14052-5_18"},{"key":"ref16","first-page":"137","article-title":"The M&#x00E4;lardalen WCET benchmarks - past, present and future","author":"gustafsson","year":"2010","journal-title":"7th WS Worst-Case Execution-Time Analysis"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2006.12"},{"key":"ref18","first-page":"3","article-title":"Operating systems technology for converged ECUs","author":"hergenhan","year":"2008","journal-title":"6th Emb Security in Cars Conf (escar)"},{"journal-title":"ISO26262 Road Vehicles - Functional Safety","article-title":"ISO","year":"2011","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531083"},{"key":"ref27","article-title":"Page table structures for fine-grain virtual memory","author":"liedtke","year":"1994","journal-title":"IEEE Technical Committee on Computer Architecture Newsletter"},{"key":"ref3","first-page":"95","article-title":"The KeyKOS nanokernel architecture","author":"bromberger","year":"1992","journal-title":"USENIX WS Microkernels & other Kernel Arch"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18275-4_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17511-4_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2011.38"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6926000"},{"journal-title":"A research agenda for mixed-criticality systems","year":"2009","author":"barhorst","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168869"},{"journal-title":"Avionics Application Software Standard Interface","year":"2012","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2516821.2516847"},{"key":"ref21","article-title":"Symbolic loop bound computation for WCET analysis","author":"knoop","year":"2011","journal-title":"International Andrei Ershov Memorial Conference"},{"key":"ref24","first-page":"136","article-title":"A fast and precise static loop analysis based on abstract interpretation, program slicing and polytope models","author":"lokuciejewski","year":"2009","journal-title":"Symp on Code Generation and Optimization"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-93900-9_19"},{"key":"ref26","first-page":"9","article-title":"Mixed-criticality support in a high-assurance, general-purpose microkernel","author":"lyons","year":"2014","journal-title":"WS Mixed Criticality Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538814"}],"event":{"name":"2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)","start":{"date-parts":[[2016,4,11]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,4,14]]}},"container-title":["2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7460013\/7461311\/07461326.pdf?arnumber=7461326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T16:48:04Z","timestamp":1475167684000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7461326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/rtas.2016.7461326","relation":{},"subject":[],"published":{"date-parts":[[2016,4]]}}}