Software safety - DEF-STAN 00-55
|
|
|
- Imogene Mills
- 9 years ago
- Views:
Transcription
1 Software safety - DEF-STAN Where safety is dependent on the safety related software (SRS) fully meeting its requirements, demonstrating safety is equivalent to demonstrating correctness with respect to the Software Requirement. Ultimate problems addressable by model checking Checking correctness of the code running on the application - Two main approaches: Code Model Checking (Software Model Checking) Model Based Development Checking safety of the system (the system never runs into an unsafe state) Concentrating on safety properties on a Model of the system Opening to probabilistic safety
2 Software Model Checking Although the early papers on model checking focused on software, not many applications to prove the correctness of code, until 1997 Until 1997 most work was on software designs Finding bugs early is more cost-effective Reality is that people write code first, rather than design Only later the harder problem of analyzing actual source code was first attempted Pioneering work at NASA Software Model Checking Most model checkers cannot directly deal with the features of modern programming languages Bringing programs to model checking Translation to a standard Model Checker Bringing model checking to programs Ad hoc model checkers that directly deal with programs as input In both cases, need of Abstraction.
3 Willem Visser 2002 Abstraction Program void add(object o) { buffer[head] = o; head = (head+1)%size; } Model Checker Input Object take() { tail=(tail+1)%size; return buffer[tail]; } Possibly infinite state Finite state Abstraction Model checkers don t take real programs as input Model checkers typically work on finite state systems Abstraction cuts the state space size to something manageable Abstraction eliminates details irrelevant to the property Disadvantage: Loss of Precision: False positives/negatives Abstraction comes in three flavors Over-approximations, i.e. more behaviors are added to the abstracted system than are present in the original Under-approximations, i.e. less behaviors are present in the abstracted system than are present in the original Precise abstractions, i.e. the same behaviors are present in the abstracted and original program
4 Under-Approximation Meat-Axe Abstraction Remove parts of the program considered irrelevant for the property being checked, e.g. Limit input values to rather than all integer values Queue size 3 instead of unbounded, etc. The abstraction of choice in the early applications of software model checking Used during the translation of code to a model checker s input language Typically manual, no guarantee that only the irrelevant behaviors are removed. Willem Visser 2002 Precise abstraction Precise abstraction, w.r.t. the property being checked, may be obtained if the behaviors being removed are indeed not influencing the property Program slicing is an example of an automated under-approximation that will lead to a precise abstraction w.r.t. the property being checked indirectly relevant Property-directed Slicing Slice mentioned in property Source program Resulting slice slicing criterion generated automatically from observables mentioned in the property backwards slicing automatically finds all components that might influence the observables.
5 Over-Approximations Abstract Interpretation Maps sets of states in the concrete program to one state in the abstract program Reduces the number of states, but increases the number of possible transitions, and hence the number of behaviors Can in rare cases lead to a precise abstraction Type-based abstractions (-->) Predicate abstraction (-->) Automated (conservative) abstraction Problem: Eliminating spurious errors Abstract program has more behaviors, therefore when an error is found in the abstract program, is that also an error in the original program? Data Type Abstraction Abstraction homomorphism h: int --> Sign Replace int by Sign abstraction {neg,pos,zero} NEG if x<0 h(x) = ZERO if x =0 POS if x>0 Code int x = 0; if (x == 0) x = x + 1; h Abstract Interpretation Sign x = ZERO; if (Sign.eq(x,ZERO)) x = Sign.add(x,POS);
6 Predicate Abstraction Willem Visser 2002 Replace predicates in the program by boolean variables, and replace each instruction that modifies the predicate with a corresponding instruction that modifies the boolean. Abstract T F EQ = T EQ := F EQ = F " : int # int bool EQ $ (x = y) EQ $ (x = y) Concrete x = y x! y x = 0 y = 0 y++ x = 0 y = 1 Mapping of a concrete system to an abstract system, whose states correspond to truth values of a set of predicate Create abstract state-graph during model checking, or, Create an abstract transition system before model checking How do we Abstract Behaviors? Abstract domain A Abstract concrete values to those in A Then compute transitions in the abstract domain Over-approximations: Add extra behaviors Under-approximations: Remove actual behaviors
7 Underlying model: Kripke Structures M = (S,s 0,%>,L) on AP! S: Set of States! s 0 : Initial State! ->: Transition Relation! L: S -> 2 AP, Labeling on States Simulations on Kripke Structures M = (S, s 0, ->, L) M = (S, s 0, ->, L ) Definition: R & S # S is a simulation relation between M and M iff (s,s ) ' R implies 1. L(s) = L (s ) 2. for all t s.t. s ( t, exists t s.t. s ( t and (t,t ) ' R. M simulates M (M ~ M ) iff (s 0, t 0 ) ' R Intuitively, every transition in M can be matched by some transition in M
8 Preservation of properties by the Abstraction M concrete model, M abstract model Strong Preservation: M = P iff M = P Weak Preservation: M = P => M = P Simulation preserves ACTL* properties If M ~ M then M = AG p => M = AG p Abstraction Homomorphisms Concrete States S, Abstract states S Abstraction function (Homomorphism) h: S -> S Induces a partition on S equal to size of S Existential Abstraction - Over-Approximation Make a transition from an abstract state if at least one corresponding concrete state has the transition. Abstract model M simulates concrete model M Universal Abstraction - Under-Approximation Make a transition from an abstract state if all the corresponding concrete states have the transition.
9 Existential Abstraction - Preservation Let ) be a Universally quantified formula (es, an ACTL* property) M existentially abstracts M, so M ~ M Preservation Theorem Converse does not hold M = ) ( M = ) M = ) ( M = ) M = ) : counterexample may be spurious NOTE: ACTL* is the universal fragment of CTL* Universal Abstraction - Preservation Let ) be a existential-quantified property (i.e., expressed in ECTL*) and M simulates M Preservation Theorem M = ) ( M = ) Converse does not hold M = f ( M = f NOTE: ECTL* is the universal fragment of CTL*
10 Model Checking (safety) I = unsafe state AG ~ unsafe (true property) Abstraction: Under-Approximation I AG ~ unsafe true (but it is not preserved)
11 Abstraction: Over-Approximation I It is not a path in the concrete system AG ~ unsafe false spurious counterexample Refinement of the abstraction : I Separate states that are the reason of the spurious counterexample AG ~ unsafe true
12 Automated Abstraction/Refinement Counterexample-Guided AR (CEGAR) Build an abstract model M Model check property P, M = P? If M = P, then M = P by Preservation Theorem Otherwise, check if Counterexample (CE) is spurious Refine abstract state space using CE analysis results Repeat M := abstract(m) T No Bug M = P F F spurious(ce) Bug T M := refine(m ) Hand-Translation Early applications at NASA Willem Visser 2002 Remote Agent Havelund,Penix,Lowry Translation from Lisp to Promela (most effort) Heavy abstraction 3 man months DEOS Penix, Visser, et al. 1998/ C++ to Promela (most effort in environment generation) Limited abstraction - programmers produced sliced system 3 man months
13 Willem Visser 2002 Semi-Automatic Translation Table-driven translation and abstraction Feaver system by Gerard Holzmann User specifies code fragments in C and how to translate them to Promela (SPIN) Translation is then automatic Found 75 errors in Lucent s PathStar system Advantages Can be reused when program changes Works well for programs with long development and only local changes Willem Visser 2002 Fully Automatic Translation Advantage No human intervention required Disadvantage Limited by capabilities of target system Examples Java PathFinder 1- Translates from Java to Promela (Spin) JCAT - Translates from Java to Promela (or dspin) Bandera - Translates from Java bytecode to Promela, SMV or dspin
14 Bringing Model Checking to Programs Allow model checkers to take programming languages as input, (or notations of similar expressive power) Major problem: how to encode the state of the system efficiently Alternatively state-less model checking No state encoding or storing On the fly model checking Almost exclusively explicit-state model checking Abstraction can still be used as well Source to source abstractions Custom-made Model Checkers Translation based dspin Spin extended with dynamic constructs Essentially a C model checker Source-2-source abstractions can be supported SPIN Version 4 PROMELA language augmented with C code Table-driven abstractions Bandera Translated Bandera Intermediate Language (BIR) to a number of back-end model checkers, but, a new BIR custommade model checker is under development Supports source-2-source abstractions as well as propertyspecific slicing
15 Willem Visser 2002 Custom-made Model Checkers Abstraction based SLAM C programs are abstracted via predicate abstraction to boolean programs for model checking BLAST Similar basic idea to SLAM, but using lazy abstraction, i.e. during abstraction refinement don t abstract the whole program only certain parts 3-Valued Model Checker (3VMC) extension of TVLA for Java programs Willem Visser 2002 Java Code Java PathFinder (JPF) Bytecode void add(object o) { buffer[head] = o; head = (head+1)%size; } Object take() { tail=(tail+1)%size; return buffer[tail]; } JAVAC 0: iconst_0 1: istore_2 2: goto #39 5: getstatic 8: aload_0 9: iload_2 10: aaload JVM Model Checker Special JVM
16 Willem Visser 2002 Bandera & JPF Architecture Property Tool Analyses Abstraction Engine BIRC BIR Translators SPIN Java Jimple (BC) dspin Parser SMV Error Trace Display Slicer Simulator Decompile ; javac JPF Willem Visser 2002 One Case Study at NASA: DS-1 Remote Agent Commands Spacecraft Tasks Subscribe Property Locks Achieve Property Sensors Data base Interrupt Properties Monitor Lock Event Change Event Several person-months to create verification model. One person-week to run verification studies.
17 Willem Visser 2002 One Case Study at NASA: DS-1 Remote Agent Monitor Logic DB change? Unexpected timing of change event yes no check wait Five difficult to find concurrency errors detected [Model Checking] has had a substantial impact, helping the RA team improve the quality of the Executive well beyond what would otherwise have been produced. - RA team During flight RA deadlocked (in code we didn t analyze) Found this deadlock with JPF Model Based Development Pioneering work at NASA has concentrated on Software Model Checking, that is, work on software as it is, maybe provided by a third party. In a large part of the safety-critical systems industry, the Model Based Design approach has emerged as the main paradigm for the development of software.
18 Model - Based Development Manual coding Modelization Phase Software Requirements Document (Finite State) Model Test Suite Test Case Definition Natural Language Formalized Architectural Design Detailed Design Architectural Design Document Detailed Design Document Coding Source code Integration Test Unit Test Functional test Model - Based Development Manual coding Modelization Phase Software Requirements Document Formalization Phase Formal Verification Properties (formal expr. of Requirements) Test Case Generation Natural Language Formalized Architectural Design Detailed Design (Finite State) Model Architectural Design Document Detailed Design Document Coding Source code Model Checking Integration Test Unit Test Test Suite Functional test
19 Model - Based Development Automatic coding Modelization Phase Software Requirements Document Test Case Definition (Finite State) Model Test Suite Natural Language Formalized Code Generation Source code Functional test Model - Based Development Automatic coding Modelization Phase Software Requirements Document Formalization Phase Formal Verification Properties (formal expr. of Requirements) Test Case Generation (Finite State) Model Model Checking Test Suite Natural Language Formalized Code Generation Source code Functional test
20 GETS model based development cycle Verification by Design Verifier use of MC still limited: model validation conducted mostly by simulation/testing Credits Willem Visser. ASE 2002 Tutorial on Software Model Checking Nishant Sinha. Lectures on Abstraction in Model Checking (ppt), 15817, Mar 2005.
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
Model Checking of Software
Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder Matt Department of Computer Science and Engineering University of Minnesota [email protected] Abstract We present
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
Lecture 9 verifying temporal logic
Basics of advanced software systems Lecture 9 verifying temporal logic formulae with SPIN 21/01/2013 1 Outline for today 1. Introduction: motivations for formal methods, use in industry 2. Developing models
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Introduction to Software Verification
Introduction to Software Verification Orna Grumberg Lectures Material winter 2013-14 Lecture 4 5.11.13 Model Checking Automated formal verification: A different approach to formal verification Model Checking
tutorial: hardware and software model checking
tutorial: hardware and software model checking gerard holzmann and anuj puri { gerard anuj } @research.bell-labs.com Bell Labs, USA outline introduction (15 mins) theory and algorithms system modeling
Model Checking based Software Verification
Model Checking based Software Verification 18.5-2006 Keijo Heljanko [email protected] Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24
Applying Model Checking in Java Verification
Applying Model Checking in Java Verification Klaus Havelund 1 and Jens Ulrik Skakkebæk 2 1 NASA Ames Research Center, Recom Technologies, Moffett Field, CA, USA [email protected], http://ase.arc.nasa.gov/havelund
Handout #1: Mathematical Reasoning
Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or
Formal Verification of Software
Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification
Temporal Logics. Computation Tree Logic
Temporal Logics CTL: definition, relationship between operators, adequate sets, specifying properties, safety/liveness/fairness Modeling: sequential, concurrent systems; maximum parallelism/interleaving
Fundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
http://aejm.ca Journal of Mathematics http://rema.ca Volume 1, Number 1, Summer 2006 pp. 69 86
Atlantic Electronic http://aejm.ca Journal of Mathematics http://rema.ca Volume 1, Number 1, Summer 2006 pp. 69 86 AUTOMATED RECOGNITION OF STUTTER INVARIANCE OF LTL FORMULAS Jeffrey Dallien 1 and Wendy
Algorithmic Software Verification
Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
An Overview of the Runtime Verification Tool Java PathExplorer
An Overview of the Runtime Verification Tool Java PathExplorer Klaus Havelund Kestrel Technology NASA Ames Research Center California, USA http://ase.arc.nasa.gov/havelund Grigore Roşu Department of Computer
Formal verification of contracts for synchronous software components using NuSMV
Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description
VeriTech - A Framework for Translating among Model Description Notations
Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) VeriTech - A Framework for Translating among Model Description Notations Orna Grumberg and Shmuel Katz Computer Science
logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?
5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
Introduction to SPIN. Acknowledgments. Parts of the slides are based on an earlier lecture by Radu Iosif, Verimag. Ralf Huuck. Features PROMELA/SPIN
Acknowledgments Introduction to SPIN Parts of the slides are based on an earlier lecture by Radu Iosif, Verimag. Ralf Huuck Ralf Huuck COMP 4152 1 Ralf Huuck COMP 4152 2 PROMELA/SPIN PROMELA (PROcess MEta
02 B The Java Virtual Machine
02 B The Java Virtual Machine CS1102S: Data Structures and Algorithms Martin Henz January 22, 2010 Generated on Friday 22 nd January, 2010, 09:46 CS1102S: Data Structures and Algorithms 02 B The Java Virtual
Fabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
The Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
Software Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
Formal Verification and Linear-time Model Checking
Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging
InvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
University of Twente. A simulation of the Java Virtual Machine using graph grammars
University of Twente Department of Computer Science A simulation of the Java Virtual Machine using graph grammars Master of Science thesis M. R. Arends, November 2003 A simulation of the Java Virtual Machine
Validated Templates for Specification of Complex LTL Formulas
Validated Templates for Specification of Complex LTL Formulas Salamah Salamah Department of Electrical, computer, Software, and Systems Engineering Embry Riddle Aeronautical University 600 S. Clyde Morris
Introduction to Static Analysis for Assurance
Introduction to Static Analysis for Assurance John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby Static Analysis for Assurance: 1 Overview What is static analysis?
Trace Server: A Tool for Storing, Querying and Analyzing Execution Traces
Trace Server: A Tool for Storing, Querying and Analyzing Execution Traces Igor Andjelkovic University of Belgrade Belgrade, Serbia [email protected] Cyrille Artho RCIS/AIST, Tsukuba, Japan [email protected]
Development of dynamically evolving and self-adaptive software. 1. Background
Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements
Aachen. Model Checking of Software for Microcontrollers. Department of Computer Science. Technical Report. Bastian Schlich
Aachen Department of Computer Science Technical Report Model Checking of Software for Microcontrollers Bastian Schlich ISSN 0935 3232 Aachener Informatik Berichte AIB-2008-14 RWTH Aachen Department of
Using Patterns and Composite Propositions to Automate the Generation of Complex LTL
University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Using Patterns and Composite Propositions to Automate the Generation of Complex
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
How To Develop A Static Analysis System For Large Programs
Towards the Industrial Scale Development of Custom Static Analyzers John Anton, Eric Bush, Allen Goldberg, Klaus Havelund, Doug Smith, Arnaud Venet Kestrel Technology LLC 4984 El Camino Real #230 Los Altos,
The software model checker BLAST
Int J Softw Tools Technol Transfer (2007) 9:505 525 DOI 10.1007/s10009-007-0044-z SPECIAL SECTION FASE 04/05 The software model checker BLAST Applications to software engineering Dirk Beyer Thomas A. Henzinger
Model Checking II Temporal Logic Model Checking
1/32 Model Checking II Temporal Logic Model Checking Edmund M Clarke, Jr School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 2/32 Temporal Logic Model Checking Specification Language:
Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl
Model checking test models Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl February 14, 2014 Abstract This thesis is about model checking testing models. These testing
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
Rigorous Software Engineering Hoare Logic and Design by Contracts
Rigorous Software Engineering Hoare Logic and Design by Contracts Simão Melo de Sousa RELEASE (UBI), LIACC (Porto) Computer Science Department University of Beira Interior, Portugal 2010-2011 S. Melo de
Formal Verification Toolkit for Requirements and Early Design Stages
Formal Verification Toolkit for Requirements and Early Design Stages Julia M. Badger 1 and Sheena Judson Miller 2 1 NASA Johnson Space Center, Houston, TX 77058, USA 2 Barrios Technology, Houston, TX 77058,
Monitoring Programs using Rewriting
Monitoring Programs using Rewriting Klaus Havelund Kestrel Technology http://ase.arc.nasa.gov/havelund NASA Ames Research Center Moffett Field, CA, 94035 Grigore Roşu Research Institute for Advanced Computer
MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY
MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY 1 Juan Carlos Polanco Aguilar 1 Koji Hasebe 1 Manuel Mazzara 2 Kazuhiko Kato 1 1 University of Tsukuba Department of
Software Verification: Infinite-State Model Checking and Static Program
Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,
The Eighth International Conference INCOSE_IL 2015. Formal Methods Security Tools in the Service of Cyber Security
The Eighth International Conference INCOSE_IL 2015 כלים ובדיקות Formal Methods Security Tools in the Service of Cyber Security Dr. Michael J. May Kinneret College on the Sea of Galilee 1 כלים ובדיקות /
The ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
Problem Sheet 9: Software Model Checking Sample Solutions
Problem Sheet 9: Software Model Checking Sample Solutions Chris Poskitt ETH Zürich 1 Predicate Abstraction i. Let us first visualise c and not c in a Venn diagram: not c c P red(not c) gives the weakest
Optimizing Generation of Object Graphs in Java PathFinder
Optimizing Generation of Object Graphs in Java PathFinder Milos Gligoric, Tihomir Gvero, Steven Lauterburg, Darko Marinov, Sarfraz Khurshid JPF Workshop 1.5.8 Bugs Six Decades Ago 1947: Harvard Mark II
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
Traditional Software Development. Model Requirements and JAVA Programs. Formal Verification & Validation. What is a state?
Mel Requirements and JAVA Programs MVP The Waterfall Mel Problem Area Traditional Software Develoment Analysis REVIEWS Design Costly wrt time and money. Errors are found too late (or maybe never). SPIN/PROMELA
Software Verification for Space Applications Part 2. Autonomous Systems. G. Brat USRA/RIACS
Software Verification for Space Applications Part 2. Autonomous Systems G. Brat USRA/RIACS Main Objectives Implement a sustained and affordable human and robotic program to explore the solar system and
General Introduction
Managed Runtime Technology: General Introduction Xiao-Feng Li ([email protected]) 2012-10-10 Agenda Virtual machines Managed runtime systems EE and MM (JIT and GC) Summary 10/10/2012 Managed Runtime
HOTPATH VM. An Effective JIT Compiler for Resource-constrained Devices
HOTPATH VM An Effective JIT Compiler for Resource-constrained Devices based on the paper by Andreas Gal, Christian W. Probst and Michael Franz, VEE 06 INTRODUCTION INTRODUCTION Most important factor: speed
Automated Domain-Specific C Verification with mbeddr
Automated Domain-Specific C Verification with mbeddr Zaur Molotnikov Fortiss Institute Guerickestraße 25 Munich, Germany [email protected] Markus Völter independent/itemis Oetztaler Straße 38 Stuttgart,
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Abstract Model Checking of Web Applications Using Java PathFinder
1 26 (2009 ) Abstract Model Checking of Web Applications Using Java PathFinder Vinh Cuong Tran Yoshinori Tanabe Masami Hagiya Due to the interleaving of clients and servers, verifying web applications
Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.
Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole
Software Quality Exercise 1
Software Quality Exercise Model Checking Information. Dates Release: 7.0.0.5pm Deadline: 07.0.0.5pm Discussion:.0.0. Formalities While this exercise can be solved and handed in in groups of three, every
LTL Model Checking with Logic Based Petri Nets
LTL Model Checking with Logic Based Petri Nets Tristan M. Behrens and Jürgen Dix IfI Technical Report Series IfI-07-04 Impressum Publisher: Institut für Informatik, Technische Universität Clausthal Julius-Albert
language 1 (source) compiler language 2 (target) Figure 1: Compiling a program
CS 2112 Lecture 27 Interpreters, compilers, and the Java Virtual Machine 1 May 2012 Lecturer: Andrew Myers 1 Interpreters vs. compilers There are two strategies for obtaining runnable code from a program
Regression Verification: Status Report
Regression Verification: Status Report Presentation by Dennis Felsing within the Projektgruppe Formale Methoden der Softwareentwicklung 2013-12-11 1/22 Introduction How to prevent regressions in software
Code Generation for High-Assurance Java Card Applets
Code Generation for High-Assurance Java Card Applets Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/ coglio
2 Temporal Logic Model Checking
Bounded Model Checking Using Satisfiability Solving Edmund Clarke 1, Armin Biere 2, Richard Raimi 3, and Yunshan Zhu 4 1 Computer Science Department, CMU, 5000 Forbes Avenue Pittsburgh, PA 15213, USA,
Applications of obfuscation to software and hardware systems
Applications of obfuscation to software and hardware systems Victor P. Ivannikov Institute for System Programming Russian Academy of Sciences (ISP RAS) www.ispras.ru Program obfuscation is an efficient
Software Model Checking: Theory and Practice
Software Model Checking: Theory and Practice Lecture: Secification Checking - Temoral Logic Coyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are coyrighted
MEMORY MODEL SENSITIVE ANALYSIS OF CONCURRENT DATA TYPES. Sebastian Burckhardt. Computer and Information Science
MEMORY MODEL SENSITIVE ANALYSIS OF CONCURRENT DATA TYPES Sebastian Burckhardt A DISSERTATION in Computer and Information Science Presented to the Faculties of the University of Pennsylvania in Partial
