{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:14Z","timestamp":1750308494017,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3543295","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"801-804","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["SpecChecker-ISA: a data sharing analyzer for interrupt-driven embedded software"],"prefix":"10.1145","author":[{"given":"Boxiang","family":"Wang","sequence":"first","affiliation":[{"name":"Xidian University, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Rui","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Tingting","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Dongdong","family":"Gao","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Mengfei","family":"Yang","sequence":"additional","affiliation":[{"name":"China Academy of Space Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. SpecCherker-ISA. https:\/\/github.com\/wangilson\/specchecker-isa \t\t\t\t\t  2022. SpecCherker-ISA. https:\/\/github.com\/wangilson\/specchecker-isa"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033020"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Performance Evaluation of Data Race Detection Based on Thread Sharing Analysis with Different Granularities: An Empirical Study. IEEE Access","volume":"99","author":"Bo L.","year":"2019","unstructured":"L. Bo , S. Jiang , J. Qian , R. Wang , and Y. Yao . 2019 . Performance Evaluation of Data Race Detection Based on Thread Sharing Analysis with Different Granularities: An Empirical Study. IEEE Access , PP , 99 (2019), 1 \u2013 1 . L. Bo, S. Jiang, J. Qian, R. Wang, and Y. Yao. 2019. Performance Evaluation of Data Race Detection Based on Thread Sharing Analysis with Different Granularities: An Empirical Study. IEEE Access, PP, 99 (2019), 1\u20131.","journal-title":"PP"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10431-7_20"},{"key":"e_1_3_2_1_5_1","unstructured":"Rui Chen Mengfei Yang and Xiangying Guo. 2016. Interrupt data race detection based on shared variable access order pattern. Ruan Jian Xue Bao\/Journal of Software 547\u2013561. \t\t\t\t\t  Rui Chen Mengfei Yang and Xiangying Guo. 2016. Interrupt data race detection based on shared variable access order pattern. Ruan Jian Xue Bao\/Journal of Software 547\u2013561."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/320385.320386"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/200994.200998"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207168908803778"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884811"},{"key":"e_1_3_2_1_11_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Kim Taegyu","year":"2021","unstructured":"Taegyu Kim , Vireshwar Kumar , Junghwan Rhee , Jizhou Chen , Kyungtae Kim , Chung Hwan Kim , Dongyan Xu , and Dave Jing Tian . 2021 . $PASAN$: Detecting Peripheral Access Concurrency Bugs within $Bare-Metal$ Embedded Applications . In 30th USENIX Security Symposium (USENIX Security 21) . 249\u2013266. Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, and Dave Jing Tian. 2021. $PASAN$: Detecting Peripheral Access Concurrency Bugs within $Bare-Metal$ Embedded Applications. In 30th USENIX Security Symposium (USENIX Security 21). 249\u2013266."},{"key":"e_1_3_2_1_12_1","volume-title":"Virtual Machine Research and Technology Symposium. 127\u2013138","author":"Nishiyama Hiroyasu","year":"2004","unstructured":"Hiroyasu Nishiyama . 2004 . Detecting Data Races Using Dynamic Escape Analysis Based on Read Barrier .. In Virtual Machine Research and Technology Symposium. 127\u2013138 . Hiroyasu Nishiyama. 2004. Detecting Data Races Using Dynamic Escape Analysis Based on Read Barrier.. In Virtual Machine Research and Technology Symposium. 127\u2013138."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/320384.320400"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Virtual South Korea","acronym":"ISSTA '22"},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3543295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3543295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3543295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":13,"alternative-id":["10.1145\/3533767.3543295","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3543295","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}