Software Verification/Validation Methods and Tools... or Practical Formal Methods
|
|
|
- Stella Mildred Horn
- 9 years ago
- Views:
Transcription
1 Software Verification/Validation Methods and Tools... or Practical Formal Methods John Rushby Computer Science Laboratory SRI International Menlo Park, CA John Rushby, SR I Practical Formal Methods: 1
2 Need: Growing Importance and Cost of Embedded Software Most of the innovation in new cars is enabled by embedded software There is more software in individual functions But the big gains come from integration across functions Integrated, distributed systems are hard to get right Especially if they have to be fault tolerant Or are safety-critical So it is common for more than 75% of embedded softweare development costs to go into verification and verification There is an opportunity to reduce costs and improve quality by applying automation to verification and verification of embedded systems John Rushby, SR I Practical Formal Methods: 2
3 Approach: Formal Methods The basic idea is to use symbolic calculation to provide cheaper and better methods of verification and validation for software and systems A single symbolic calculation can subsume many individual numeric cases Just as x 2 y 2 = (x y) (x + y) Subsumes = 2 10 and 49 4 = 5 9 and... Can be used to find rare error scenarios as well as to verify their absence Symbolic calculation is mechanized using the methods of automated reasoning: theorem proving, model checking, constraint solving, etc. There has been sustained progress in these fields for several decades and they have recently broken through the barriers to practical application SRI has been a leader of this technology throughout its history John Rushby, SR I Practical Formal Methods: 3
4 A Spectrum of Formal Methods Interactive theorem proving: requires great skill and resources Can solve very hard problems E.g., Verify that Flexray s clock synchronization withstands any single fault Model checking: analysis is automatic but must specify the model and property Can search huge state spaces (trillions of reachable states) efficiently E.g., Find the worst case start up delay for Flexray E.g., Check that horizontally integrated functions interact as expected Invisible formal methods: driven directly off model-based developments Uses symbolic calculation to automate traditional work flows E.g., Generate unit test cases to provide MC/DC coverage E.g., Find me an input vector that gets me to here with x > 3 Check compliance with guidelines (e.g., no 12 o clock rule in Stateflow) John Rushby, SR I Practical Formal Methods: 4
5 Our Tools Cover the Spectrum Assurance SAL PVS ICS invisible model checking automated abstraction theorem proving formal methods Effort John Rushby, SR I Practical Formal Methods: 5
6 Our Tools PVS: Industrial strength theorem prover (since 1993) Probably the most widely used theorem prover in research and education Used for verification of AAMP5 (Rockwell) And Time Triggered Architecture (TTTech, NASA, Honeywell) GM group in Asia has recently applied for a license Some other commercial users (e.g., Sun) SAL: Industrial strength suite of model checkers (since 2003) Used for analysis of TTA startup A current application focus is automated test generation ICS: Core decision procedures and SAT solver used in PVS and SAL Designed to be embedded in other tools See fm.csl.sri.com for descriptions and our roadmap John Rushby, SR I Practical Formal Methods: 6
7 Invisible Formal Methods New design practices: model-based development methods provide the artifacts needed by automated analysis Models serve as formal specifications We have a formal semantics and translator for Stateflow New technology (in SAL): very fast, scalable model checkers that can handle arithmetic and other data types New ideas: invisible formal methods These combine to create new opportunities Example: Generate test vectors that will drive an implementation through all the states and transitions of its model John Rushby, SR I Practical Formal Methods: 7
8 Automated Test Case Generation Basic approach uses the counterexamples generated by a model checker Counterexample to you cannot get here is a test case that gets you there There are several technical issues dealing with arithmetic in specifications Which we have solved (patents pending) Existing methods give many short tests with much redundancy We have new methods that generate fewer deeper tests (patent pending) E.g., State coverage for a 4-speed shift selector in one test of length 86 We also have technology (automated analysis of hybrid systems) that could take test test generation beyond unit tests into integration and system tests John Rushby, SR I Practical Formal Methods: 8
9 Benefits: Simplified Vee Diagram time and money requirements system test design/code unit/integration test Automated formal analysis can tighten the vee John Rushby, SR I Practical Formal Methods: 9
10 Tightened Vee Diagram time and money requirements system test design/code unit/integration test John Rushby, SR I Practical Formal Methods: 10
11 Competition Test generation for Statemate is automated by Motorola in Veristate Good integration, relies on user-written test observers, weak FM technology For Simulink by T-VEC Good integration and methods, weak FM technology For Stateflow by RSI in Reactis Good integration and methods, weak FM technology We have the best FM technology, more powerful test generation methods, the ability to go beyond test generation, but less integration with commercial products John Rushby, SR I Practical Formal Methods: 11
12 Summary We are the experts in practical formal methods, and can help others Evaluate Apply Develop this technology Our PVS, SAL, ICS tools are mature (though continually enhanced) and available for licensing We are seeking partners to help us develop and evaluate our technology for automated unit test generation And other applications for invisible formal methods John Rushby, SR I Practical Formal Methods: 12
Software Verification and System Assurance
Software Verification and System Assurance John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Verification
Development of AUTOSAR Software Components within Model-Based Design
2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior
Introduction to Static Analysis for Assurance
Introduction to Static Analysis for Assurance John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby Static Analysis for Assurance: 1 Overview What is static analysis?
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development
Rigorous Methods for Software Engineering (F21RS1) High Integrity Software Development Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Parameters for Efficient Software Certification
Parameters for Efficient Software Certification Roland Wolfig, [email protected] Vienna University of Technology, Real-Time Systems Group 1 Abstract Software certification is a common approach
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Formal verification of contracts for synchronous software components using NuSMV
Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für Informatik 8 Bachelorarbeit 13.05.2014 1 / 19 Problem description and goals Problem description
Best Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
New Challenges In Certification For Aircraft Software
New Challenges In Certification For Aircraft Software John Rushby Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I Aircraft Software Certification 1 Overview The basics
Power inverters: Efficient energy transformation through efficient TargetLink code
Page 6 santerno Power inverters: Efficient energy transformation through efficient TargetLink code Upva page 7 lue Energy Every day, the amount of energy delivered by the sun is 15,000 times the current
SCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
What is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
Assurance Cases and Test Design Analysis
Assurance Cases and Test Design Analysis Flight Software Workshop November 7-9, 2012 Khalid Lateef Ph.D. Outline Scope Test Design challenges Assurance cases Example of test design IV&V for an automobile
Introducing Formal Methods. Software Engineering and Formal Methods
Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended
Agile Model-Based Systems Engineering (ambse)
Agile Model-Based Systems Engineering (ambse) Bruce Powel Douglass, Ph.D. Chief Evangelist, Global Technology Ambassador IBM Rational [email protected] Twitter: @BruceDouglass Yahoo: tech.groups.yahoo.com/group/rt-uml/
How To Test Automatically
Automated Model-Based Testing of Embedded Real-Time Systems Jan Peleska [email protected] University of Bremen Bieleschweig Workshop 7 2006-05-05 Outline Technologie-Zentrum Informatik Objectives Basic concepts
Part I. Introduction
Part I. Introduction In the development of modern vehicles, the infotainment system [54] belongs to the innovative area. In comparison to the conventional areas such as the motor, body construction and
System requirements for ICS Skills ATS
System requirements for ICS Skills ATS A system requirements check verifies that the computer fulfils the requirements to run ICS Skills Automated tests. There are 4 possible checks that can be made prior
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
What Is Assurance? John Rushby Based on joint work with Bev Littlewood (City University UK)
What Is Assurance? John Rushby Based on joint work with Bev Littlewood (City University UK) Computer Science Laboratory SRI International Menlo Park CA USA John Rushby, SR I What Is Assurance? 1 A Conundrum
Automated Formal Analysis of Internet Routing Systems
Automated Formal Analysis of Internet Routing Systems Boon Thau Loo University of Pennsylvania [Joint work with Anduo Wang (Penn -> UIUC), Wenchao Zhou (Georgetown), Andre Scedrov (Penn), Limin Jia (CMU),
Integration of Formal Analysis into a Model-Based Software Development Process
Integration of Formal Analysis into a Model-Based Software Development Process Michael Whalen 1, Darren Cofer 1, Steven Miller 1, Bruce H. Krogh 2, Walter Storm 3 1 Rockwell Collins Inc., Advanced Technology
IBM Rational Rhapsody
IBM Rational Rhapsody IBM Rational Rhapsody Reference Workflow Guide Version 1.9 License Agreement No part of this publication may be reproduced, transmitted, stored in a retrieval system, nor translated
TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization
TeCReVis: A Tool for Test Coverage and Test Redundancy Visualization Negar Koochakzadeh Vahid Garousi Software Quality Engineering Research Group University of Calgary, Canada Acknowledging funding and
Policy Modeling and Compliance Verification in Enterprise Software Systems: a Survey
Policy Modeling and Compliance Verification in Enterprise Software Systems: a Survey George Chatzikonstantinou, Kostas Kontogiannis National Technical University of Athens September 24, 2012 MESOCA 12,
Model Based System Engineering (MBSE) For Accelerating Software Development Cycle
Model Based System Engineering (MBSE) For Accelerating Software Development Cycle Manish Patil Sujith Annamaneni September 2015 1 Contents 1. Abstract... 3 2. MBSE Overview... 4 3. MBSE Development Cycle...
www.dspace.com Model-Based Development of Safety-Critical Software: Safe and Effi cient
www.dspace.com Model-Based Development of Safety-Critical Software: Safe and Effi cient Translation of Sicherheitskritische Software entwickeln Published at: MEDengineering, 06/2012 Software for safety-critical
What makes a good process?
Rob Davis Everyone wants a good process. Our businesses would be more profitable if we had them. But do we know what a good process is? Would we recognized one if we saw it? And how do we ensure we can
ESP-CV Custom Design Formal Equivalence Checking Based on Symbolic Simulation
Datasheet -CV Custom Design Formal Equivalence Checking Based on Symbolic Simulation Overview -CV is an equivalence checker for full custom designs. It enables efficient comparison of a reference design
Certification of a Scade 6 compiler
Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What
Applying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
Why Adopt Model-Based Design for Embedded Control Software Development?
Why Adopt Model-Based Design for Embedded Control Software Development? As requirements for increased product performance are driving up design complexity, embedded software is increasingly becoming the
InvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
Compositional Security Evaluation: The MILS approach
Compositional Security Evaluation: The MILS approach John Rushby and Rance DeLong Computer Science Laboratory SRI International Menlo Park CA USA Primary affiliation: LynuxWorks John Rushby, Rance DeLong,
FlexRay A Communications Network for Automotive Control Systems
FlexRay A Communications Network for Automotive Control Systems WFCS 2006 Rainer Makowitz Automotive Systems Engineering, EMEA Freescale and the Freescale logo are trademarks of Freescale Semiconductor,
A Comprehensive Safety Engineering Approach for Software Intensive Systems based on STPA
www.uni-stuttgart.de A Comprehensive Safety Engineering Approach for Software Intensive Systems based on STPA STPA-based Approach STPA Safety Analysis Asim Abdulkhaleq, Ph.D Candidate Institute of Software
System Aware Cyber Security
System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012
How to improve customer experience with a self-organizing network. Lukasz Mendyk OSS Product Manager, Comarch
How to improve customer experience with a self-organizing network Lukasz Mendyk OSS Product Manager, Comarch Agenda Introduction Self-Organizing Network and Customer Experience What are the challenges?
Next-Generation Performance Testing with Service Virtualization and Application Performance Management
Next-Generation Performance Testing with Service Virtualization and Application Performance Management By Akshay Rao, Principal Consultant, CA Technologies Summary Current approaches for predicting with
Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software
ABSTRACT Verification and Validation According to ISO 26262: A Workflow to Facilitate the Development of High-Integrity Software Mirko Conrad The MathWorks, Inc. Natick, MA, USA [email protected]
Dr. Brian Murray March 4, 2011
Event that could lead to an accident GM Autonomy HAZARD 1 Q=6e-7 Event that could lead to a hazard Control to prevent HAZARDOUS EVENT 1 HAZARDOUS EVENT 1 HAZARD CONTROL 1 r=6e-008 Q=0.0006 Q=0.001 Q=0.001
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.
SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE Cheryl A. Dorsey Digital Flight / Solutions [email protected] DIGITAL FLIGHT / SOLUTIONS Presentation Outline DO-178 Overview
Mathematical finance and linear programming (optimization)
Mathematical finance and linear programming (optimization) Geir Dahl September 15, 2009 1 Introduction The purpose of this short note is to explain how linear programming (LP) (=linear optimization) may
Why We Model: Using MBD Effectively in Critical Domains
Why We Model: Using MBD Effectively in Critical Domains Mike Whalen Program Director, UMSEC University of Minnesota 5/19/2013 Why We Model - Mike Whalen 1 Acknowledgements Rockwell Collins (Darren Cofer,
BENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin [email protected]
BENEFITS OF MODELING WITH A FORMAL LANGUAGE Emmanuel Gaudin [email protected] PragmaDev French software editor based in Paris Dedicated to the development of RTDS: a modeling and testing tool
How To Protect Video From Being Lost In A Fault Fault On A Network With A Shadow Archive
A MARCH NETWORKS WHITE PAPER Shadow Archiving in Video Surveillance Systems Fail Safe Recording Options for IP Edge Devices Table of Contents Executive Summary...2 Introduction...2 Background...2 DVR
Simple and error-free startup of the communication cluster. as well as high system stability over long service life are
Network Management for FlexRay New network topologies tested in practice Simple and error-free startup of the communication cluster as well as high system stability over long service life are required
Lab Management, Device Provisioning and Test Automation Software
Lab Management, Device Provisioning and Test Automation Software The TestShell software framework helps telecom service providers, data centers, enterprise IT and equipment manufacturers to optimize lab
The Course. http://www.cse.unsw.edu.au/~cs3153/
The Course http://www.cse.unsw.edu.au/~cs3153/ Lecturers Dr Peter Höfner NICTA L5 building Prof Rob van Glabbeek NICTA L5 building Dr Ralf Huuck NICTA ATP building 2 Plan/Schedule (1) Where and When Tuesday,
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Federated, Generic Configuration Management for Engineering Data
Federated, Generic Configuration Management for Engineering Data Dr. Rainer Romatka Boeing GPDIS_2013.ppt 1 Presentation Outline I Summary Introduction Configuration Management Overview CM System Requirements
Automating Code Reviews with Simulink Code Inspector
Automating Code Reviews with Simulink Code Inspector Mirko Conrad, Matt Englehart, Tom Erkkinen, Xiaocang Lin, Appa Rao Nirakh, Bill Potter, Jaya Shankar, Pete Szpak, Jun Yan, Jay Clark The MathWorks,
Design and Verification of Nine port Network Router
Design and Verification of Nine port Network Router G. Sri Lakshmi 1, A Ganga Mani 2 1 Assistant Professor, Department of Electronics and Communication Engineering, Pragathi Engineering College, Andhra
Rigorous Software Development An introduction
Rigorous Software Development An introduction Simão Melo de Sousa RELEASE (UBI), LIACC (Porto), CCTC (Minho) Computer Science Department University of Beira Interior, Portugal October 2011 S. Melo de Sousa
The MILS Component Integration Approach To Secure Information Sharing
The MILS Component Integration Approach To Secure Information Sharing Carolyn Boettcher, Raytheon, El Segundo CA Rance DeLong, LynuxWorks, San Jose CA John Rushby, SRI International, Menlo Park CA Wilmar
Automated Theorem Proving - summary of lecture 1
Automated Theorem Proving - summary of lecture 1 1 Introduction Automated Theorem Proving (ATP) deals with the development of computer programs that show that some statement is a logical consequence of
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
The SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München [email protected] Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Combinational Logic Design Process
Combinational Logic Design Process Create truth table from specification Generate K-maps & obtain logic equations Draw logic diagram (sharing common gates) Simulate circuit for design verification Debug
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
Human-Automation Interaction Design and Evaluation Tools. Michael Feary, PhD
Human-Automation Interaction Design and Evaluation Tools Michael Feary, PhD Outline Human Automation interaction Research Challenges Research Approach Understanding Work domain analysis Visualization Prediction
White Paper Software Quality Management
White Paper What is it and how can it be achieved? Successfully driving business value from software quality management is imperative for many large organizations today. Historically, many Quality Assurance
Model Checking of Software
Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
Why WebSphere Operational Decision Management?
Why WebSphere Operational Decision Management? A Case for Business Users of Information Technology Contents 1 Introduction 2 Business policies, business rules and business events 4 How WebSphere Operational
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
System Description: The MathWeb Software Bus for Distributed Mathematical Reasoning
System Description: The MathWeb Software Bus for Distributed Mathematical Reasoning Jürgen Zimmer 1 and Michael Kohlhase 2 1 FB Informatik, Universität des Saarlandes [email protected] 2 School of Computer
CHAPTER 3 Boolean Algebra and Digital Logic
CHAPTER 3 Boolean Algebra and Digital Logic 3.1 Introduction 121 3.2 Boolean Algebra 122 3.2.1 Boolean Expressions 123 3.2.2 Boolean Identities 124 3.2.3 Simplification of Boolean Expressions 126 3.2.4
A Classification of Model Checking-based Verification Approaches for Software Models
A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software
Software Verification for Space Applications Part 2. Autonomous Systems. G. Brat USRA/RIACS
Software Verification for Space Applications Part 2. Autonomous Systems G. Brat USRA/RIACS Main Objectives Implement a sustained and affordable human and robotic program to explore the solar system and
Software Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
Comparison of FlexRay and CAN-bus for Real-Time Communication
Comparison of FlexRay and CAN-bus for Real-Time Communication Andreas Forsberg Mälardalen University Högskoleplan 1 721 23 Västerås +46 768011236 [email protected] Johan Hedberg Mälardalen University
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
Code Generation for High-Assurance Java Card Applets
Code Generation for High-Assurance Java Card Applets Alessandro Coglio Kestrel Institute 3260 Hillview Avenue, Palo Alto, CA 94304, USA Ph. +1-650-493-6871 Fax +1-650-424-1807 http://www.kestrel.edu/ coglio
White Paper. An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit
White Paper An Introduction to Informatica s Approach to Enterprise Architecture and the Business Transformation Toolkit This document contains Confidential, Proprietary and Trade Secret Information (
RATP safety approach for railway signalling systems
RATP safety approach for railway signalling systems ReSIST summer School 007 Pierre CHARTIER Summary. Introduction. Hardware fault detection. 6 Introduction Global railway system Rolling stock Environment
CDC UNIFIED PROCESS PRACTICES GUIDE
Purpose The purpose of this document is to provide guidance on the practice of Modeling and to describe the practice overview, requirements, best practices, activities, and key terms related to these requirements.
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
Formal Foundations for Security Architecture
Formal Foundations for Security Architecture Ron van der Meyden (University of New South Wales Sydney, Australia) May 5, 2010 Overview Some recent Australian events MILS Security Towards a formal theory
Foundational Proof Certificates
An application of proof theory to computer science INRIA-Saclay & LIX, École Polytechnique CUSO Winter School, Proof and Computation 30 January 2013 Can we standardize, communicate, and trust formal proofs?
