{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:22Z","timestamp":1763467822524,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T00:00:00Z","timestamp":1194307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,6]]},"DOI":"10.1145\/1322263.1322283","type":"proceedings-article","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T14:39:06Z","timestamp":1196433546000},"page":"205-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Efficient memory safety for TinyOS"],"prefix":"10.1145","author":[{"given":"Nathan","family":"Cooprider","sequence":"first","affiliation":[{"name":"University of Utah"}]},{"given":"Will","family":"Archer","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"Eric","family":"Eide","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"David","family":"Gay","sequence":"additional","affiliation":[{"name":"Intel Research, Berkeley"}]},{"given":"John","family":"Regehr","sequence":"additional","affiliation":[{"name":"University of Utah"}]}],"member":"320","published-online":{"date-parts":[[2007,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"116","volume-title":"Proc. of the Seventh Workshop on Hot Topics in Operating Systems (HotOS)","author":"Godmar","year":"1999","unstructured":"Godmar V. Back and Wilson C. Hsieh. Drawing the red line in Java . In Proc. of the Seventh Workshop on Hot Topics in Operating Systems (HotOS) , pages 116 -- 121 , Rio Rico, AZ , March 1999 . IEEE Computer Society. Godmar V. Back and Wilson C. Hsieh. Drawing the red line in Java. In Proc. of the Seventh Workshop on Hot Topics in Operating Systems (HotOS), pages 116--121, Rio Rico, AZ, March 1999. IEEE Computer Society."},{"key":"e_1_3_2_1_2_1","first-page":"425","volume-title":"Proof, language, and interaction: essays in honour of Robin Milner, Foundations of Computing","author":"Berry G\u00e9rard","year":"2001","unstructured":"G\u00e9rard Berry . The foundations of Esterel . In Proof, language, and interaction: essays in honour of Robin Milner, Foundations of Computing , pages 425 -- 454 . MIT Press , 2001 . G\u00e9rard Berry. The foundations of Esterel. In Proof, language, and interaction: essays in honour of Robin Milner, Foundations of Computing, pages 425--454. MIT Press, 2001."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762174.1762221"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134650.1134658"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.93"},{"key":"e_1_3_2_1_6_1","unstructured":"The Deputy Project 2007. http:\/\/deputy.cs.berkeley.edu.  The Deputy Project 2007. http:\/\/deputy.cs.berkeley.edu."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053271.1053275"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182809"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134319"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/956650.956651"},{"key":"e_1_3_2_1_14_1","first-page":"275","volume-title":"Proc. of the USENIX Annual Technical Conf.","author":"Jim Trevor","year":"2002","unstructured":"Trevor Jim , Greg Morrisett , Dan Grossman , Michael Hicks , James Cheney , and Yanling Wang . Cyclone : A safe dialect of C . In Proc. of the USENIX Annual Technical Conf. , pages 275 -- 288 , Monterey, CA , June 2002 . Trevor Jim, Greg Morrisett, Dan Grossman, Michael Hicks, James Cheney, and Yanling Wang. Cyclone: A safe dialect of C. In Proc. of the USENIX Annual Technical Conf., pages 275--288, Monterey, CA, June 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/581630.581678"},{"key":"e_1_3_2_1_16_1","volume-title":"Safeware: System Safety and Computers","author":"Leveson Nancy","year":"1995","unstructured":"Nancy Leveson . Safeware: System Safety and Computers . Addison-Wesley , 1995 . Nancy Leveson. Safeware: System Safety and Computers. Addison-Wesley, 1995."},{"key":"e_1_3_2_1_17_1","volume-title":"TinyOS Extension Proposal (TEP) 111: message_t","author":"Levis Philip","year":"2006","unstructured":"Philip Levis . TinyOS Extension Proposal (TEP) 111: message_t , 2006 . http:\/\/www.tinyos.net\/tinyos-2.x\/doc\/html\/tep111.html. Philip Levis. TinyOS Extension Proposal (TEP) 111: message_t, 2006. http:\/\/www.tinyos.net\/tinyos-2.x\/doc\/html\/tep111.html."},{"key":"e_1_3_2_1_19_1","volume-title":"Handbook of Software Reliability Engineering","author":"Lyu Michael R.","year":"1995","unstructured":"Michael R. Lyu . Handbook of Software Reliability Engineering . McGraw-Hill , 1995 . Michael R. Lyu. Handbook of Software Reliability Engineering. McGraw-Hill, 1995."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647478.727796"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1215995.1216001"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the 3rd Workshop on Embedded Networked Sensors (EmNets)","author":"Rengaswamy Ram Kumar","year":"2006","unstructured":"Ram Kumar Rengaswamy , Eddie Kohler , and Mani Srivastava . Software-based memory protection in sensor nodes . In Proc. of the 3rd Workshop on Embedded Networked Sensors (EmNets) , Cambridge, MA , May 2006 . Ram Kumar Rengaswamy, Eddie Kohler, and Mani Srivastava. Software-based memory protection in sensor nodes. In Proc. of the 3rd Workshop on Embedded Networked Sensors (EmNets), Cambridge, MA, May 2006."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086307"},{"key":"e_1_3_2_1_25_1","unstructured":"Sun Microsystems. Sun SPOT system: Turning vision into reality. http:\/\/research.sun.com\/spotlight\/SunSPOTSJune30.pdf 2005.  Sun Microsystems. Sun SPOT system: Turning vision into reality. http:\/\/research.sun.com\/spotlight\/SunSPOTSJune30.pdf 2005."},{"key":"e_1_3_2_1_26_1","volume-title":"March","author":"Microsystems Sun","year":"2006","unstructured":"Sun Microsystems . Java Card Specification 2.2.2 , March 2006 . Sun Microsystems. Java Card Specification 2.2.2, March 2006."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167489"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147768"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the 7th Symp. on Operating Systems Design and Implementation (OSDI)","author":"Zhou Feng","year":"2006","unstructured":"Feng Zhou , Jeremy Condit , Zachary Anderson , Ilya Bagrak , Rob Ennals , Matthew Harren , George Necula , and Eric Brewer . Safedrive : Safe and recoverable extensions using language-based techniques . In Proc. of the 7th Symp. on Operating Systems Design and Implementation (OSDI) , November 2006 . Feng Zhou, Jeremy Condit, Zachary Anderson, Ilya Bagrak, Rob Ennals, Matthew Harren, George Necula, and Eric Brewer. Safedrive: Safe and recoverable extensions using language-based techniques. In Proc. of the 7th Symp. on Operating Systems Design and Implementation (OSDI), November 2006."}],"event":{"name":"SenSys07: The 5th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","NSF National Science Foundation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Sydney Australia","acronym":"SenSys07"},"container-title":["Proceedings of the 5th international conference on Embedded networked sensor systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1322263.1322283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1322263.1322283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:38:59Z","timestamp":1750253939000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1322263.1322283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,6]]},"references-count":28,"alternative-id":["10.1145\/1322263.1322283","10.1145\/1322263"],"URL":"https:\/\/doi.org\/10.1145\/1322263.1322283","relation":{},"subject":[],"published":{"date-parts":[[2007,11,6]]},"assertion":[{"value":"2007-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}