Skip to main content

An Improved RTEMS Supporting Real-Time Detection of Stack Overflow

  • Conference paper
  • First Online:

Abstract

Aiming at the common problem of stack overflow in satellite software, this paper improves the RTEMS operating system which is supporting real-time stack use depth and overflow detection. Taking the on-board software based on TSC690F processor as an example, the accessible area and unaccessible area are set for each thread stack by using the memory access protection mechanism provided by the processor. The improved RTEMS shared the access protection mechanism among threads through context switching. A trap handler is designed to take over write protection error traps, calculate stack usage depth, and monitor stack overflow in real time. The core module performance test and stack detection instance verification show that the improved RTEMS has little effect on the software performance, so that the software can detect the stack depth online and real-time. By using this method, the software is still manageable in case of stack overflow, rather than runaway crash, and the reliability of the software is improved.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, H., Yin, C.: Analysis and improvement of RTEMS memory management. In: CONFERENCE 2009 First International Workshop on Education Technology and Computer Science (2009)

    Google Scholar 

  2. He, X., Sun, Y.: Engineering realization of software in central terminal unit of satellite data management system. J. Spacecr. Eng. 16(5), 47–53 (2007)

    Google Scholar 

  3. Kuperman, B.A., Brodley, C.E.: Detection and prevention of stack buffer overflow attacks. J. Commun. ACM 48(11), 51–56 (2005)

    Google Scholar 

  4. Dong, Z., Hou, C., Guo, J., et al.: Dynamic detection method of spacecraft software process stack used depth. J. Spacecr. Eng. 26(1), 85–90 (2017)

    Google Scholar 

  5. Cao, Y., Wang, Y.: An overview of the stack protection techniques in the GCC compiler. J. Inf. Technol. (7), 23–25(2017)

    Google Scholar 

  6. Pan, Q., Wang, C., Yang, Y.: Analysis and prevention of the stack overflow attacking. J. Shanghai Jiaotong Univ. 36(9), 1346–1350 (2002)

    Google Scholar 

  7. Sun, H., Xu, L., Yang, H.: The principle and detection of buffer overflow attack. J. Comput. Eng. 27(1), 127–128 (2001)

    Google Scholar 

  8. ATMEL Corporation: TSC695FSPARC 32-bit Space Processor User Manual

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rui Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, R., Du, Y., Zhang, T., Qiu, Q., Mao, L., Niu, J. (2019). An Improved RTEMS Supporting Real-Time Detection of Stack Overflow. In: Jia, M., Guo, Q., Meng, W. (eds) Wireless and Satellite Systems. WiSATS 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 280. Springer, Cham. https://doi.org/10.1007/978-3-030-19153-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19153-5_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19152-8

  • Online ISBN: 978-3-030-19153-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics