Interface-based Design 5. Tom Henzinger EPFL and UC Berkeley

Size: px
Start display at page:

Download "Interface-based Design 5. Tom Henzinger EPFL and UC Berkeley"

Transcription

1 Interface-based Design Tom Henzinger PF and C Berkeley

2 Interface A Interface B Interface A Interface B Code a Code b

3 .. Interface A Interface B Interface A Interface B. Code a Code b. Interface compatibility checking: solving graph games CHIC [Chakrabarti]. Interface refinement checking: alternating simulation relations

4 ... Interface A Interface B Interface A Interface B.. Code a Code b. Interface compatibility checking: solving graph games. Interface refinement checking: alternating simulation relations. Conformance checking of code against interface BAST [Jhala,Majumdar,Sutre]

5 Interface Conformance Checking with BAST example () { : do { ; : if (*) { : ; new ++; } : } while (new!= old); : ; : return; } lock! unlock! Interface Automaton.

6 Interface Conformance Checking with BAST example () { : do { ; : if (*) { : ; new ++; } : } while (new!= old); : ; : return; } Monitor Automaton.

7 Control Flow Graph example () { : do { ; : if (*) { : ; new ++; } : } while (new!= old); : ; : return; } ;

8 Abstract Reachability ;

9 Abstract Reachability ;

10 Abstract Reachability ; ;

11 Abstract Reachability ; ;

12 Abstract Reachability ; ;

13 Concretize rror Trace ; ; true

14 Concretize rror Trace ; ; true true

15 Concretize rror Trace ; new = old ; true true

16 Concretize rror Trace new+ = old ; new = old ; true true

17 Concretize rror Trace new+ = old new+ = old ; new = old ; true true

18 Concretize rror Trace new+ = new new+ = old new+ = old ; new = old ; true true

19 Concretize rror Trace Spurious! new+ = new new+ = old new+ = old ; new = old ; true true

20 Concretize rror Trace Spurious! new+ = new new = old is a relevant predicate new+ = old new+ = old ; new = old ; true true

21 Refined Abstract Reachability, new = old ;

22 Refined Abstract Reachability, new = old, new = old ;, new old ;

23 Refined Abstract Reachability, new = old, new = old ;, new old ;

24 Refined Abstract Reachability, new = old, new = old ;, new old ;, new old

25 Refined Abstract Reachability covered, new = old ;, new = old ;, new old, new old

26 Refined Abstract Reachability, new = old, new = old ;, new old [new!= old], new = old ;, new old

27 Refined Abstract Reachability, new = old, new = old ;, new old [new!= old], new = old, new = old ;, new old

28 Abstract Reachability Tree, new = old ;, new = old ;, new old [new!= old], new = old, new = old, new = old, new old

29 Abstract Reachability Tree = Proof, new = old Inductive invariant: (pc=! Æ new=old) Æ (pc=! Æ new=old) Æ ;, new = old ;, new old [new!= old], new = old, new = old, new = old, new old

30 esson : Automatic Program Verification Abstract + Search Identify relevant facts. Track relevant facts. =

31 A Brief History (and Future) of Model Checking 980s: Theory of finite-state model checking [Clarke/merson, Sifakis, et al.] 990s: Techniques to combat state explosion Finite-state model checking penetrates the hardware industry [Fujitsu, Intel, Motorola, Siemens, etc.] Theory of infinite-state model checking 000s: Techniqes for automatic abstraction Infinite-state model checking penetrates the software industry!

Model Checking of Software

Model Checking of Software Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

Software Verification: Infinite-State Model Checking and Static Program

Software Verification: Infinite-State Model Checking and Static Program Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,

More information

Modeling and Validation of a Data Process Unit Control for Space Applications

Modeling and Validation of a Data Process Unit Control for Space Applications Modeling and Validation of a Data Process Unit Control for Space Applications Wan Hai, Huang Chongdi, Wang Yuhui, He Fei and Gu Ming Key Lab of ISS of MOE, TNList, School of Software, Tsinghua University,

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

How To Prove That A Program Is Terminating

How To Prove That A Program Is Terminating I N F O R M A T I K Software Model Checking of Liveness Properties via Transition Invariants Andreas Podelski Andrey Rybalchenko MPI I 2003 2 004 December 2003 FORSCHUNGSBERICHT RESEARCH REPORT M A X -

More information

Model Checking II Temporal Logic Model Checking

Model Checking II Temporal Logic Model Checking 1/32 Model Checking II Temporal Logic Model Checking Edmund M Clarke, Jr School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 2/32 Temporal Logic Model Checking Specification Language:

More information

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 jackie.z.zhang@saic.com,

More information

Program Synthesis is a Game

Program Synthesis is a Game Program Synthesis is a Game Barbara Jobstmann CNRS/Verimag, Grenoble, France Outline Synthesis using automata- based game theory. MoBvaBon, comparison with MC and LTL. Basics Terminology Reachability/Safety

More information

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris

More information

Model Checking based Software Verification

Model Checking based Software Verification Model Checking based Software Verification 18.5-2006 Keijo Heljanko Keijo.Heljanko@tkk.fi Department of Computer Science and Engineering Helsinki University of Technology http://www.tcs.tkk.fi/~kepa/ 1/24

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

Pulse: Plural To EVMDD-SMC

Pulse: Plural To EVMDD-SMC Pulse: Plural To EVMDD-SMC Automated Verification of Specifications with Typestates and Access Permissions Ijaz Ahmed 1 Néstor Cataño 1 Radu I. Siminiceanu 2 1 Carnegie Mellon University - Portugal, The

More information

SYNTHESIS FROM PROBABILISTIC COMPONENTS

SYNTHESIS FROM PROBABILISTIC COMPONENTS Logical Methods in Computer Science Vol. 10(2:17)2014, pp. 1 24 www.lmcs-online.org Submitted Feb. 29, 2012 Published Jun. 30, 2014 SYNTHESIS FROM PROBABILISTIC COMPONENTS YOAD LUSTIG a, SUMIT NAIN b,

More information

InvGen: An Efficient Invariant Generator

InvGen: An Efficient Invariant Generator InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Lecture 9 verifying temporal logic

Lecture 9 verifying temporal logic Basics of advanced software systems Lecture 9 verifying temporal logic formulae with SPIN 21/01/2013 1 Outline for today 1. Introduction: motivations for formal methods, use in industry 2. Developing models

More information

Second year review WP2 overview SW-based Method. Trento - October 17th, 2008

Second year review WP2 overview SW-based Method. Trento - October 17th, 2008 Second year review WP2 overview SW-based Method Trento - October 17th, 2008 1 Goal To investigate software-only methodologies for remote entrusting implementation 2 Tasks D2.3 D2.4 M0 M3 M6 M9 M12 M15

More information

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.

TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs. CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express

More information

Texas Essential Knowledge and Skills Correlation to Video Game Design Foundations 2011 N130.0993. Video Game Design

Texas Essential Knowledge and Skills Correlation to Video Game Design Foundations 2011 N130.0993. Video Game Design Texas Essential Knowledge and Skills Correlation to Video Game Design Foundations 2011 N130.0993. Video Game Design STANDARD CORRELATING PAGES Standard (1) The student demonstrates knowledge and appropriate

More information

SHARED HASH TABLES IN PARALLEL MODEL CHECKING

SHARED HASH TABLES IN PARALLEL MODEL CHECKING SHARED HASH TABLES IN PARALLEL MODEL CHECKING IPA LENTEDAGEN 2010 ALFONS LAARMAN JOINT WORK WITH MICHAEL WEBER AND JACO VAN DE POL 23/4/2010 AGENDA Introduction Goal and motivation What is model checking?

More information

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms 15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms Maxim Likhachev Robotics Institute Carnegie Mellon University AI Architecture from Artificial Intelligence for Games by

More information

A Classification of Model Checking-based Verification Approaches for Software Models

A Classification of Model Checking-based Verification Approaches for Software Models A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software

More information

Software Model Checking. Equivalence Hierarchy

Software Model Checking. Equivalence Hierarchy Software Equivalence Hierarchy Moonzoo Kim CS Dept. KAIST CS750B Software Korea Advanced Institute of Science and Technology Equivalence semantics and SW design Preliminary Hierarchy Diagram Trace-based

More information

Verification of hybrid dynamical systems

Verification of hybrid dynamical systems Verification of hybrid dynamical systems Jüri Vain Tallinn Technical University/Institute of Cybernetics vain@ioc.ee Outline What are Hybrid Systems? Hybrid automata Verification of hybrid systems Verification

More information

Code Coverage Testing Using Hardware Performance Monitoring Support

Code Coverage Testing Using Hardware Performance Monitoring Support Code Coverage Testing Using Hardware Performance Monitoring Support Alex Shye Matthew Iyer Vijay Janapa Reddi Daniel A. Connors Department of Electrical and Computer Engineering University of Colorado

More information

The ProB Animator and Model Checker for B

The ProB Animator and Model Checker for B The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,

More information

Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl

Model checking test models. Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl Model checking test models Author: Kevin de Berk Supervisors: Prof. dr. Wan Fokkink, dr. ir. Machiel van der Bijl February 14, 2014 Abstract This thesis is about model checking testing models. These testing

More information

Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction

Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction Noname manuscript No. (will be inserted by the editor) Generating Models of Infinite-State Communication Protocols using Regular Inference with Abstraction Fides Aarts Bengt Jonsson Johan Uijen Frits Vaandrager

More information

tutorial: hardware and software model checking

tutorial: hardware and software model checking tutorial: hardware and software model checking gerard holzmann and anuj puri { gerard anuj } @research.bell-labs.com Bell Labs, USA outline introduction (15 mins) theory and algorithms system modeling

More information

Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm

Introduction to Formal Methods. Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Introduction to Formal Methods Các Phương Pháp Hình Thức Cho Phát Triển Phần Mềm Outline Introduction Formal Specification Formal Verification Model Checking Theorem Proving Introduction Good papers to

More information

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Model Based Testing for Security Checking Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Outline Introduction Active/Passive Testing Active Testing

More information

Verification Everywhere: Security, Dependability, Reliability. Lenore D. Zuck Usable Verification, May 25, 2011

Verification Everywhere: Security, Dependability, Reliability. Lenore D. Zuck Usable Verification, May 25, 2011 Verification Everywhere: Security, Dependability, Reliability Lenore D. Zuck Usable Verification, May 25, 2011 1 Trustworthy Protocols: NTLM A suite of Microsoft security protocols Proves authentication,

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Motivations 1. What is (or should be) the essential preoccupation of computer scientists?

Motivations 1. What is (or should be) the essential preoccupation of computer scientists? Improving Systems Quality Challenges and Trends An Abstract Interpretation Perspective Patrick COUSOT École Normale Supérieure 45 rue d Ulm, 75230 Paris cedex 05, France Patrick.Cousot@ens.fr www.di.ens.fr/

More information

From Hybrid Data-Flow Languages to Hybrid Automata: A Complete Translation

From Hybrid Data-Flow Languages to Hybrid Automata: A Complete Translation From Hybrid Data-Flow Languages to Hybrid Automata: A Complete Translation Peter Schrammel peter.schrammel@inria.fr (joint work with Bertrand Jeannet) INRIA Grenoble Rhône-Alpes INRIA large-scale initiative

More information

Hagit Attiya and Eshcar Hillel. Computer Science Department Technion

Hagit Attiya and Eshcar Hillel. Computer Science Department Technion Hagit Attiya and Eshcar Hillel Computer Science Department Technion !!" What are highly-concurrent data structures and why we care about them The concurrency of existing implementation techniques Two ideas

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

MetaGame: An Animation Tool for Model-Checking Games

MetaGame: An Animation Tool for Model-Checking Games MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de

More information

Formal Verification of Software

Formal Verification of Software Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification

More information

CPC31411 Certificate III in Construction Waterproofing

CPC31411 Certificate III in Construction Waterproofing CPC31411 Certificate III in Construction Waterproofing Release 2 CPC31411 Certificate III in Construction Waterproofing Modification History Revised qualification deemed equivalent to CPC31411 Elective

More information

System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems

System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.

More information

Modeling and Verification of Sampled-Data Hybrid Systems

Modeling and Verification of Sampled-Data Hybrid Systems Modeling and Verification of Sampled-Data Hybrid Systems Abstract B. Izaias Silva and Bruce H. Krogh Dept. of Electrical and Computer Engineering, Carnegie Mellon University (Izaias /krogh)@cmu.edu We

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005

Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005 Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable

More information

Test Case Generation for Ultimately Periodic Paths Joint work with Saddek Bensalem Hongyang Qu Stavros Tripakis Lenore Zuck Accepted to HVC 2007 How to find the condition to execute a path? (weakest precondition

More information

Software Verification with Program-Graph Interpolation and Abstraction. Aws Albarghouthi

Software Verification with Program-Graph Interpolation and Abstraction. Aws Albarghouthi Software Verification with Program-Graph Interpolation and Abstraction by Aws Albarghouthi A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

Process Mining Using BPMN: Relating Event Logs and Process Models

Process Mining Using BPMN: Relating Event Logs and Process Models Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:

More information

Overview of E0222: Automata and Computability

Overview of E0222: Automata and Computability Overview of E0222: Automata and Computability Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. August 3, 2011 What this course is about What we study

More information

The software model checker BLAST

The software model checker BLAST Int J Softw Tools Technol Transfer (2007) 9:505 525 DOI 10.1007/s10009-007-0044-z SPECIAL SECTION FASE 04/05 The software model checker BLAST Applications to software engineering Dirk Beyer Thomas A. Henzinger

More information

Advanced Design and Validation Techniques for Electronic Control Units

Advanced Design and Validation Techniques for Electronic Control Units Copyright 1998 Society of Automotive Engineers, Inc. SAE Paper 980199 Advanced Design and Validation Techniques for Electronic Control Units Max Fuchs, Michael Eckrich BMW AG, Systems Engineering, EG-K-3,

More information

Modeling, Verification and Testing using Timed and Hybrid. Automata. Stavros Tripakis and Thao Dang

Modeling, Verification and Testing using Timed and Hybrid. Automata. Stavros Tripakis and Thao Dang Modeling, Verification and Testing using Timed and Hybrid Automata Stavros Tripakis and Thao Dang September 12, 2008 ii Contents 1 Modeling, Verification and Testing using Timed and Hybrid Automata 1 1.1

More information

Approaches to Improve System Dependability From Formal Verification to Model-Based Testing

Approaches to Improve System Dependability From Formal Verification to Model-Based Testing Approaches to Improve System Dependability From Formal Verification to Model-Based Testing Andreas Ulrich, Peter Amthor, Marlon Vieira Siemens AG, Corporate Technology, CT SE/SCR andreas.ulrich@siemens.com

More information

Formal Verification by Model Checking

Formal Verification by Model Checking Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Computer Science. Cabrillo College Catalog 2011-2012

Computer Science. Cabrillo College Catalog 2011-2012 COMPUTER SCIENCE Natural Applied Sciences Division Wa Garner, Division Dean Division Office, Room 701 Susan Nerton, Program Chair, (831) 479-6545 Aptos Counsel: (831) 479-6274 f appointment Watsonville

More information

Structure of Presentation. Stages in Teaching Formal Methods. Motivation (1) Motivation (2) The Scope of Formal Methods (1)

Structure of Presentation. Stages in Teaching Formal Methods. Motivation (1) Motivation (2) The Scope of Formal Methods (1) Stages in Teaching Formal Methods A. J. Cowling Structure of Presentation Introduction to Issues Motivation for this work. Analysis of the Role of Formal Methods Define their scope; Review their treatment

More information

Brno University of Technology. PhD. Thesis. Symbolic Data Structures for Parametric Verification

Brno University of Technology. PhD. Thesis. Symbolic Data Structures for Parametric Verification Brno University of Technology Faculty of Information Technology PhD. Thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Symbolic Data Structures for Parametric

More information

Sales Order Changes Tracked for PO-1020 SO-1459

Sales Order Changes Tracked for PO-1020 SO-1459 Sales Order Changes Tracked for PO-1020 SO-1459 Overview This Extended Solution to the Sales Order module creates a new file, which is written to each time a Sales Order line is changed if it contains

More information

Automated Quantitative Software Verification

Automated Quantitative Software Verification Automated Quantitative Software Verification by Mark Kattenbelt A thesis submitted for the degree of Doctor of Philosophy Trinity College, Oxford Trinity Term 2010 Abstract Many software systems exhibit

More information

Introduction to Information Security

Introduction to Information Security Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit

More information

Assertion-based Analysis of Hybrid Systems with PVS

Assertion-based Analysis of Hybrid Systems with PVS Assertion-based Analysis of Hybrid Systems with PVS Erika Ábrahám-Mumm, Ulrich Hannemann, and Martin Steffen Institut für Informatik und Praktische Mathematik Christian-Albrechts-Universität zu Kiel Preußerstraße

More information

Finite Automata. Reading: Chapter 2

Finite Automata. Reading: Chapter 2 Finite Automata Reading: Chapter 2 1 Finite Automaton (FA) Informally, a state diagram that comprehensively captures all possible states and transitions that a machine can take while responding to a stream

More information

The product. SIMAC a machine simulator. Plan. Presentation of the simulation. Simulation, why? What : SIMAC product. Page 1 SIMAC

The product. SIMAC a machine simulator. Plan. Presentation of the simulation. Simulation, why? What : SIMAC product. Page 1 SIMAC SIMAC a machine simulator SIMAC The product SIMAC 10-2003 - 1 Plan 1 Presentation of the simulation 2 Simulation, why? 3 What : SIMAC product SIMAC 10-2003 - 2 Page 1 SIMAC objectives Different from others

More information

managedip Trunking TDS Table of Contents Essentials Special Calling Features

managedip Trunking TDS Table of Contents Essentials Special Calling Features Table of Contents Flash Hook Features... 2 Feature Access Code Calls... 4 Additional Support... 5 167485/9-15/9072 1 Flash Hook Features Features using the flash hook are available on devices with flash

More information

Domains and Competencies

Domains and Competencies Domains and Competencies DOMAIN I TECHNOLOGY APPLICATIONS CORE Standards Assessed: Computer Science 8 12 I VII Competency 001: The computer science teacher knows technology terminology and concepts; the

More information

Formal Software Testing. Terri Grenda, CSTE IV&V Testing Solutions, LLC www.ivvts.com

Formal Software Testing. Terri Grenda, CSTE IV&V Testing Solutions, LLC www.ivvts.com Formal Software Testing Terri Grenda, CSTE IV&V Testing Solutions, LLC www.ivvts.com Scope of Testing Find defects early Remove defects prior to production Identify Risks Unbiased opinion When Should Testing

More information

The SH-Verification Tool

The SH-Verification Tool From: FLAIRS-00 Proceedings. Copyright 2000, AAAI (www.aaai.org). All rights reserved. The SH-Verification Tool Peter Ochsenschläger and Jürgen Repp and Roland Rieke SIT Institute for Secure Telecooperation,

More information

CSE4213 Lecture Notes

CSE4213 Lecture Notes CSE4213 Lecture Notes Introduction to B Tools Computer Science and Software Engineering Monash University 20070226 / Lecture 1 ajh 1/15 1 Outline 2 3 4 5 ajh 2/15 In this course we will be introducing

More information

Database Support for PC Software Configuration and Version Management in the START Network

Database Support for PC Software Configuration and Version Management in the START Network Database Support for PC Software Configuration and Version Management in the START Network S. Auerbach *, A. Buchmann, I. Buchmann *, T. Kudraß, K. Lange *, C. Lier *, K. Weidmann * * START Informatik

More information

On Omega-Languages Defined by Mean-Payoff Conditions

On Omega-Languages Defined by Mean-Payoff Conditions On Omega-Languages Defined by Mean-Payoff Conditions Rajeev Alur 1, Aldric Degorre 2, Oded Maler 2, Gera Weiss 1 1 Dept. of Computer and Information Science, University of Pennsylvania, USA {alur, gera}@cis.upenn.edu

More information

MULTI-FACTOR AUTHENTICATION SET-UP

MULTI-FACTOR AUTHENTICATION SET-UP MULTI-FACTOR AUTHENTICATION SET-UP DepositPartner Desktop Application TABLE OF CONTENTS Click the link below to go to the section you need: First Time Enrollment Enrolled User Contact information on file

More information

White Paper on Consolidation Ratios for VDI implementations

White Paper on Consolidation Ratios for VDI implementations White Paper on Consolidation Ratios for VDI implementations Executive Summary TecDem have produced this white paper on consolidation ratios to back up the return on investment calculations and savings

More information

Path Querying on Graph Databases

Path Querying on Graph Databases Path Querying on Graph Databases Jelle Hellings Hasselt University and transnational University of Limburg 1/38 Overview Graph Databases Motivation Walk Logic Relations with FO and MSO Relations with CTL

More information

Cabrillo College Catalog 2015-2016

Cabrillo College Catalog 2015-2016 COMPUTER SCIENCE Natural Applied Sciences Division Wa Garner, Division Dean Division Office, Room 701 Steve Hodges, Program Contact, (831) 479-6494 Aptos Counsel: (831) 479-6274 f appointment Watsonville

More information

INF5140: Specification and Verification of Parallel Systems

INF5140: Specification and Verification of Parallel Systems Motivation INF5140: Specification and Verification of Parallel Systems Lecture 1 Introduction: Formal Methods Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2009 Outline

More information

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Introduction to Automated Testing

Introduction to Automated Testing Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases

More information

Feature-Based Decomposition of Inductive Proofs Applied to Real-Time Avionics Software

Feature-Based Decomposition of Inductive Proofs Applied to Real-Time Avionics Software Feature-Based Decomposition of Inductive Proofs Applied to Real-Time Avionics Software Vu Ha, Murali Rangarajan, and Darren Cofer Honeywell International 3660 Technology Drive Minneapolis, MN 55418 Harald

More information

EZ RMC Remote HMI App Application Guide for Android Devices

EZ RMC Remote HMI App Application Guide for Android Devices EZ RMC Remote HMI App Application Guide for Android Devices The EZ RMC Remote HMI App is an application designed for your Android devices to enable the monitoring and control of your EZTouch HMIs from

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

The Model Checker SPIN

The Model Checker SPIN The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(

More information

Software Development Technologies for Reactive, Real-Time, and Hybrid Systems. 1996 Progress Report NASA grant NAG2-892

Software Development Technologies for Reactive, Real-Time, and Hybrid Systems. 1996 Progress Report NASA grant NAG2-892 NASA-CR-205329 "/ '"" " Software Development Technologies for Reactive, Real-Time, and Hybrid Systems 1996 Progress Report NASA grant NAG2-892 P.I. : Professor Zohar Manna Computer Science Department Stanford

More information

Circuit Simulation and Technical Support Tools

Circuit Simulation and Technical Support Tools TDK EMC Technology Practice Section Circuit Simulation and Technical Support Tools TDK Corporation Application Center Tetsuya Umemura, Katsushi Ebata 1 Utilization of Computer Simulation In recent years,

More information

RATP safety approach for railway signalling systems

RATP safety approach for railway signalling systems RATP safety approach for railway signalling systems ReSIST summer School 007 Pierre CHARTIER Summary. Introduction. Hardware fault detection. 6 Introduction Global railway system Rolling stock Environment

More information

Finite Automata. Reading: Chapter 2

Finite Automata. Reading: Chapter 2 Finite Automata Reading: Chapter 2 1 Finite Automata Informally, a state machine that comprehensively captures all possible states and transitions that a machine can take while responding to a stream (or

More information

linear hybrid automata is undecidable the method provides also diagnostic information that aids in design

linear hybrid automata is undecidable the method provides also diagnostic information that aids in design Symbolic Analysis of Hybrid Systems y Rajeev Alur 1 Thomas A. Henzinger 2 Howard Wong-Toi 3 Abstract. A hybrid system is a dynamical system whose behavior exhibits both discrete and continuous change.

More information

A Classification of Model Checking-Based Verification Approaches for Software Models

A Classification of Model Checking-Based Verification Approaches for Software Models Volt Second Workshop on Verification Of Model Transformations, 2013, A Classification of Model Checking-Based Verification Approaches for Software Models Sebastian Gabmeyer a Petra Brosch a Martina Seidl

More information

Semantics and Verification of Software

Semantics and Verification of Software Semantics and Verification of Software Lecture 21: Nondeterminism and Parallelism IV (Equivalence of CCS Processes & Wrap-Up) Thomas Noll Lehrstuhl für Informatik 2 (Software Modeling and Verification)

More information

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,

More information

Formal Engineering for Industrial Software Development

Formal Engineering for Industrial Software Development Shaoying Liu Formal Engineering for Industrial Software Development Using the SOFL Method With 90 Figures and 30 Tables Springer Contents Introduction 1 1.1 Software Life Cycle... 2 1.2 The Problem 4 1.3

More information

CPU Benchmarks Over 600,000 CPUs Benchmarked

CPU Benchmarks Over 600,000 CPUs Benchmarked Shopping cart Search Home Software Hardware Benchmarks Services Store Support Forums About Us Home» CPU Benchmarks» Multiple CPU Systems CPU Benchmarks Video Card Benchmarks Hard Drive Benchmarks RAM PC

More information

Static Analysis of Virtualization- Obfuscated Binaries

Static Analysis of Virtualization- Obfuscated Binaries Static Analysis of Virtualization- Obfuscated Binaries Johannes Kinder School of Computer and Communication Sciences École Polytechnique Fédérale de Lausanne (EPFL), Switzerland Virtualization Obfuscation

More information

Distributed and Predictable Software Model Checking

Distributed and Predictable Software Model Checking Distributed and Predictable Software Model Checking Nuno P. Lopes 1 and Andrey Rybalchenko 2 1 INESC-ID / IST, TU Lisbon 2 Technische Universität München Abstract. We present a predicate abstraction and

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions The Veterinary Data Logger What is it and what are its capabilities? Typical uses (procedure logging & charting, ECG capture, screen event capture) How does the Data Logger make

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information