The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Model-based analysis is a well-established method to assess the dependability of a system before deployment. It is well known that, in highly dynamic contexts, the accuracy of the analysis results can be limited because unpredictable phenomena may affect the system during its operation. In such contexts, the analysis typically needs to be refined with data obtained from real system executions. In...
Complexity of software systems has reached the point where we need run-time mechanisms that can be used to provide fault management services. Testing and verification may not cover all possible scenarios that a system will encounter, hence a simpler, yet formally specified run-time monitoring, diagnosis, and fault mitigation architecture is needed to increase the software system's dependability. The...
This paper presents an automated verification methodology aimed at detecting failures in multimedia systems based on a black box testing approach. Moreover, the verification is performed using a black test box as part of a test harness. The quality of a system is examined against functional failures using a model-based testing approach for generating test scenarios. System under test (specifically,...
As software continues to expand the scale and more and more reliability requirements come from users, how to measure reliability of each component of the software has become a key issue in software development. So, in this paper, a novel guarantee-verification method based on cloud service was proposed from the aspect of component service. First, the component's trustworthiness was defined in terms...
Based upon the software reliability and reliability design of information system, this paper puts forward various measures of software structure design, software error-avoided design of simplified design, reuse design and interface design, software error-tolerated design of redundancy design, robust design and recovery design, software error checking and correcting design. Thenceforth a primary prospect...
The correctness and reliability of requirement specifications are vital to cost and success of developing a software system, especially for networked software within complex and dynamic change environment. In this work, the solution to verification of O-RGPS, which gives a meta-model for requirement modelling of large-scale networked software, is proposed. Firstly, adopting hybrid reasoning way, consistency...
Agile software development is a kind of lightweight development method, which can satisfy to the changes of requirements. This paper applies formal methods into agile software development, and investigates the method to adopt the rCOS in agile software development through convincing examples to improve software trustworthiness.
In recent years, architecture analysis & design language (AADL) has been applied to the development of dependable real-time systems, in which the quality of the developed software is an important factor. Thus, to make sure that real-time systems are really dependable, we must verify the important properties, such as safety and reliability. This paper describes a contribution to the transformation...
Littlewood introduced the idea that software may be possibly perfect and that we can contemplate its probability of (im)perfection. We review this idea and show how it provides a bridge between correctness, which is the goal of software verification (and especially formal verification), and the probabilistic properties such as reliability that are the targets for system-level assurance. We enumerate...
In safety critical software failure can have a high price. Such software should be free of errors before it is put into operation. Application of formal methods in the software development life cycle helps to ensure that the software for safety critical missions are ultra reliable. PVS theorem prover, a formal method tool, can be used for the formal verification of software in ADA language for flight...
Assertions or formal program specifications are fundamental to build more reliable software. One of the most important applications of assertions is found in the design by contract metaphor: pre-conditions, invariants and post-conditions. Current assertion approaches use some software technology that relies on simple mechanisms; however their actual implementation can be both quite complex and instrusive...
Software-based applications with high reliability demands require extensive verification and validation activities capable of providing significant evidence for the achievement of the reliability degree required. For the purpose of exposing interaction faults, extensive integration testing phases are recommended. In order to support them the article proposes appropriate interaction coverage concepts...
Automated model checking shortcomings is prone to state explosion. In this paper, we propose abstraction framework based on Promela models, and transform the source of Promela models to the abstract target of Promela models. On this basis, we analyze the reasons for the complexity of model checking based on Promela models. Finally we reduce the number of state-generated under the condition of verification...
Most system level software is written in C and executed concurrently. Because such software is often critical for system reliability, it is an ideal target for formal verification. Annotated C and the Verified C Compiler (VCC) form the first modular sound verification methodology for concurrent C that scales to real-world production code. VCC is integrated in Microsoft Visual Studio and it comes with...
Bounded model checking-as well as symbolic equivalence checking-are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC have been developed that are able to check properties of (mostly low-level) software written in C. However, using these tools to check equivalence of software implementations has rarely been pursued. In this case study we tackle...
Layering is a concept widely used in computer and software modeling. Many modern information systems are designed and built using a layered model where the function of each layer is specified and well defined. In this paper we will be discussing the layer whose responsibilities include data extraction, manipulation and provision of data to the rest of the application. Common design problems that designers...
Software reliability is becoming increasingly important in todaypsilas information era. Many techniques have been proposed to improve software reliability with varying degrees of success. One important technique in this regard is the so-called formal methods which include formal verification, formal specification, formal analysis, and formal modeling. While these formal methods cover many phases of...
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react to security vulnerabilities. Contracts can provide a useful mechanism for identifying and tracking vulnerabilities. Currently, contracts have been proposed for reliability and formal verification; yet, their use in security...
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in improving the precision of vulnerabilities detection. However, when applied to buffer overflow and other bugs, it is hard to automatically construct the model for detecting the vulnerabilities. To address this problem we propose...
Systems verification requires first to model the system to be verified, then to formalize the properties to be satisfied, and finally to describe the behaviour of the environment. This last point, known as the proof context, is often neglected. It could, however, be of great importance in order to reduce the complexity of the proof. The question is then how to formalize such a proof context. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.