A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Approach: Integrating Object Oriented Design and Formal Verification
[chapter]
2000
Lecture Notes in Computer Science
This paper reports on the ongoing KeY project aimed at bridging the gap between (a) object-oriented software engineering methods and tools and (b) deductive verification. ...
A distinctive feature of our approach is the use of a commercial CASE tool enhanced with functionality for formal specification and deductive verification. ...
As a case study to evaluate the usability of our approach we develop a scenario using smart cards with JAVA CARD as programming language [12, 13] . ...
doi:10.1007/3-540-40006-0_3
fatcat:buhfdmn74rhbjp5snxbfeuzxei
Developing Java Card Applications with B
2007
Electronical Notes in Theoretical Computer Science
This work proposes a methodology for the rigorous development of Java Card smart card applications, using the B Method. ...
Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. ...
Languages like C, the assembly language of the card and Java Card can be used to develop these applications. ...
doi:10.1016/j.entcs.2007.03.016
fatcat:pjtnn2nh6bd6vdhc2dglcvnd6e
Procedure-modular verification of control flow safety properties
2010
Proceedings of the 12th Workshop on Formal Techniques for Java-Like Programs - FTFJP '10
This paper describes a novel technique for fully automated procedure-modular verification of Java programs equipped with method-local and global assertions that specify safety properties of sequences of ...
Modularity of verification is achieved by relativizing the correctness of global properties on the local properties rather than on the implementations of methods, and is based on the construction of maximal ...
We are indebted to Wojciech Mostowski and Erik Poll for their help in finding a suitable case study, and to Stefan Schwoon for adapting the input language of the PDS model checker Moped to our needs. ...
doi:10.1145/1924520.1924525
dblp:conf/ecoop/SoleimanifardGH10
fatcat:5xepdvldjjc4dpmcttvhffi6e4
Memory Forensics of a Java Card Dump
[chapter]
2015
Lecture Notes in Computer Science
Nowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card. ...
Then, once the code area has been identified, we propose to rebuilt the original binary Cap file in order to be able to obtain the source code of the applet stored in the card. ...
Tokens are used in the Method, Class, Static Field and Descriptor components. ...
doi:10.1007/978-3-319-16763-3_1
fatcat:yivbhmziknbbpcvm55wu3oscp4
Auto-Modularity Enforcement Framework Using Micro-service Architecture
2020
Journal of Visual Language and Computing
We implemented this framework to support visual software development using the Java Spring Boot Micro-service tool. ...
A B S T R A C T The evolution of the software architecture has been progressively shifting to emphasize modularity, isolation, scalability, agility, and loose coupling. ...
We implemented our framework on a welldefined experimental system using the Java Spring Boot developing template. ...
doi:10.18293/jvlc2020-n2-008
fatcat:zzf4b7k4tvhvzjunlf54bypxtm
Formalisation and Verification of the GlobalPlatform Card Specification Using the B Method
[chapter]
2006
Lecture Notes in Computer Science
We give an overview of an application of the B method to the formalisation and verification of the GlobalPlatform Card Specification. ...
The model consistency has been thoroughly verified using formal techniques supported by the B method. ...
Jean-Louis Lanet and Lilian Burdy kindly provided their expertise in the B method and valuable insights while the specification was being developed. ...
doi:10.1007/11741060_9
fatcat:ygwsocnqovd7fkzikcbioajraq
The KeY tool
2005
Journal of Software and Systems Modeling
The target language of KeY based development is Java Card DL, a proper subset of Java for smart card applications and embedded systems. ...
KeY uses a dynamic logic for Java Card DL to express proof obligations, and provides a state-of-the-art theorem prover for interactive and automated verification. ...
We would like to thank numerous students for their contributions to the implementation of the KeY tool. ...
doi:10.1007/s10270-004-0058-x
fatcat:bhaebuosyndkfjhhjc4pqnypju
Refining interfaces: the case of the B method
[article]
2009
arXiv
pre-print
Model-driven design of software for safety-critical applications often relies on mathematically grounded techniques such as the B method. ...
This makes it possible to take advantage of the mathematical guarantees and tool support provided for the current refinement-based techniques, such as the B method. ...
The goal of the Bsmart project [3] is to develop a customized version of the B method for the development of Java Card software components, as well as the corresponding tool support (as an Eclipse plug-in ...
arXiv:0907.2039v1
fatcat:per6wsuoczdqzj7sstsrdsc2oa
ProMoVer: Modular Verification of Temporal Safety Properties
[chapter]
2011
Lecture Notes in Computer Science
We evaluate the tool on a number of applications from the smart card domain. ...
This paper describes ProMoVer, a tool for fully automated procedure-modular verification of Java programs equipped with methodlocal and global assertions that specify safety properties of sequences of ...
, and to Stefan Schwoon for adapting the input language of Moped to our needs. ...
doi:10.1007/978-3-642-24690-6_25
fatcat:7h3ee6xc6zcz3f44hbwihj5r7u
An overview of JML tools and applications
2004
International Journal on Software Tools for Technology Transfer (STTT)
Thus far, most applications have focused on code for programming smartcards written in the Java Card dialect of Java. ...
The Java Modeling Language (JML) can be used to specify the detailed design of Java classes and interfaces by adding annotations to Java source files. ...
Work on the JML tools at Iowa State builds on the MultiJava compiler written by Curtis Clifton as an adaptation of the Kopi Java compiler. ...
doi:10.1007/s10009-004-0167-4
fatcat:d32n2qlspzahzg7reahunakfh4
Formalising Java Safety—An Overview
[chapter]
2000
Smart Card Research and Advanced Applications
We review the existing literature on Java safety, emphasizing formal approaches, and the impact of Java. safety on small footprint devices such as smart ca.rds. ...
The conclusion is that while a. lot of good work has been done, a more concerted effort is needed to build a. coherent set of machine readable formal models of the whole of Java. and its implementation ...
Acknowledgements The help and comments of Egon Borger, Luc Moreau, and the anonymous referees is gratefully acknowledged. ...
doi:10.1007/978-0-387-35528-3_7
fatcat:56uqzqoh6nbbllkysyxqwwiz44
Automated size analysis for OCL
2007
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering - ESEC-FSE '07
The OCL specification of the Java Card API consists of 31 classes and 150 methods. ...
To demonstrate the effectiveness of our approach we conducted a case study on the OCL specification of the Java Card API [9] . ...
The OCL specification of the Java Card API was developed as a part of this project [9] . ...
doi:10.1145/1287624.1287671
dblp:conf/sigsoft/YuBP07
fatcat:ezfhg7bpljfi3hqpudd363nppe
KeY: A Formal Method for Object-Oriented Systems
[chapter]
2007
Lecture Notes in Computer Science
The intention is to provide a platform that allows close collaboration of conventional and formal software development methods. ...
This paper gives an overview of the KeY approach and highlights the main features of the KeY system. KeY is an approach (and a system) for the deductive verification of object-oriented software. ...
The KeY verification component, being the core of the KeY system, can also be used as a stand-alone prover. ...
doi:10.1007/978-3-540-72952-5_2
fatcat:ulq2gvp7yjdkrf5zyjat3xqnwy
Formal Methods for Smartcard Security
[chapter]
2005
Lecture Notes in Computer Science
The objective of this chapter is to describe some applications of formal methods to increase the reliability of smartcards and trusted personal devices. ...
used to increase the reliability of platforms and applications for trusted personal devices. ...
members of the EVEREST and LEMME teams at INRIA Sophia-Antipolis for stimulating interactions over the years. ...
doi:10.1007/11554578_5
fatcat:4y7miflopjhs7ik5wvacpen7f4
A Heuristic Technique for Automated Test Cases Generation from UML Activity Diagram
2012
i-manager's Journal on Software Engineering
The most widely used class of automated testing tools leads senior software testers into software development blunders that a first year programming student shouldn't make. ...
Lastly, the results of experiments show that this method has a better performance. ...
Case Study The proposed method is evaluated by the Sequence diagram (Fig 2) of Banking System created using rational rose is used for generating automated test case from it. ...
doi:10.26634/jse.6.3.1787
fatcat:nlif4lrsknc63jut6iap333f4m
« Previous
Showing results 1 — 15 out of 8,422 results