Filters








4,874 Hits in 5.6 sec

Compositional Verification of Smart Contracts Through Communication Abstraction (Extended) [article]

Scott Wesley and Maria Christakis and Jorge A. Navas and Richard Trefler and Valentin Wüstholz and Arie Gurfinkel
2021 arXiv   pre-print
Solidity smart contracts are programs that manage up to 2^160 users on a blockchain. Verifying a smart contract relative to all users is intractable due to state explosion.  ...  We implement local bundle abstraction in SmartACE, and show order-of-magnitude speedups compared to a state-of-the-art verifier.  ...  In this way, smart contract verification is reduced to parameterized verification. For example, consider Auction in Fig. 1 (for now, ignore the highlighted lines).  ... 
arXiv:2107.08583v2 fatcat:2m4dmlj25bd3dki2jjjvctreia

Formalizing and Verifying Decentralized Systems with Extended Concurrent Separation Logic [article]

Yepeng Ding, Hiroyuki Sato
2020 arXiv   pre-print
and the smart contract.  ...  Meanwhile, formalization and verification of the decentralized systems is the key to ensuring correctness of the design and security properties of the implementation.  ...  Smart Contract We follow the unitarity principle to unify the specification and verification of decentralized systems at different abstraction levels with our logic.  ... 
arXiv:2008.08245v1 fatcat:kq7usjbswfd37mbltmst2fie7a

Extended static checking [chapter]

K. R. M. Leino
1998 Programming Concepts and Methods PROCOMET '98  
Abstract The paper describes a mechanical checker for software that catches many common programming errors, in particular array index bounds errors, nil dereference errors, and synchronization errors in  ...  It has been applied to thousands of lines of code, including mature systems code as well as fresh untested code, and it has found a number of errors.  ...  Steve Glassman first used ESC to perform a locking-level verification of the readers and writers package. Allan Heydon performed the lockinglevel verification of the Trestle Tutorial.  ... 
doi:10.1007/978-0-387-35358-6_1 fatcat:mktrvpe7rjgopdq6e6rfkane64

Extending Concurrent Separation Logic to Enhance Modular Formalization [article]

Yepeng Ding, Hiroyuki Sato
2020 arXiv   pre-print
In this paper, we propose an extended concurrent separation logic (ECSL) to address the modularity issues of CSL with the support of the temporal extension, communication extension, environment extension  ...  ECSL is capable of formalizing systems at different abstraction levels from memory management to architecture and protocol design with great modularity.  ...  Particularly, ECSL is capable of formalizing nested systems containing both peer communications and cross-layer communications, which enables ECSL to specify and verify complex systems.  ... 
arXiv:2007.13685v1 fatcat:xauilnnebfgz3ktvuwd6wx3aia

Prisma: A Tierless Language for Enforcing Contract-Client Protocols in Decentralized Applications (Extended Version) [article]

David Richter, David Kretzler, Pascal Weisenburger, Guido Salvaneschi, Sebastian Faust, Mira Mezini
2022 arXiv   pre-print
Decentralized applications (dApps) consist of smart contracts that run on blockchains and clients that model collaborating parties. dApps are used to model financial and legal business functionality.  ...  Today, contracts and clients are written as separate programs -- in different programming languages -- communicating via send and receive operations.  ...  Given the abstractions we offer beyond the traditional development approach, and the sensibility of smart contracts to small changes in instructions, we conclude that our abstractions come Threats to validity  ... 
arXiv:2205.07780v1 fatcat:plscefwjtjdvjmpzjzvqfetqhi

Model Checking of Extended OCL Constraints on UML Models in SOCLe [chapter]

John Mullins, Raveca Oarga
2007 Lecture Notes in Computer Science  
We present the first tool that offers dynamic verification of extended OCL constraints on UML models.  ...  The Extended Object Constraints Language (EOCL) is interpreted on computation trees of this OOT SUML allowing for the statement of both OCL expressions modelling the system and OO primitives binding it  ...  version of SOCLe presented in [17] , which is based on a naive approach to verification of OCL extended with fixed points to express temporal contracts.  ... 
doi:10.1007/978-3-540-72952-5_4 fatcat:zgdhlfyngfbnri7fqvgtustaua

Supporting the entire life-cycle of the extended manufacturing enterprise

Americo Azevedo, José Faria, Filipe Ferreira
2017 Robotics and Computer-Integrated Manufacturing  
The case shows how the platform addresses the two main challenges in the deployment of an extended enterprise.  ...  a framework to support the full life-cycle of extended manufacturing enterprises, from creation to operation and dissolution phases.  ...  Acknowledgements This work was developed in the scope of the Project "TEC4-Growth -Pervasive Intelligence, Enhancers and Proofs of Concept with Industrial Impact/NORTE-01-0145-FEDER-000020" which is financed  ... 
doi:10.1016/j.rcim.2016.05.009 fatcat:msc6zb6plbatbkvnvaobsoidrm

Extending Enterprise Architecture with Mobility

Ming-Chien Wu, Bhuvan Unhelkar
2008 VTC Spring 2008 - IEEE Vehicular Technology Conference  
Preface This thesis reflects my research study and its results in the area of extending Enterprise Architecture with Emerging Mobile Technologies presenting a comprehensive structure that aims to extend  ...  Due to my supervisor's kindly help, I had more than 300 emails per year with him to deeply communicate my research objective and direction, my idea of M-EA models and structure, -iii -methodology selection  ...  Abstracting EA framework This section is abstracting above mentioned five EA frameworks, and following comparative table is a community of those five EA frameworks: Web Service (WS) and Service-Oriented  ... 
doi:10.1109/vetecs.2008.617 dblp:conf/vtc/WuU08 fatcat:udab4nu64ve2pjpzy3agzjhyca

A Practical Approach for Extending DSMLs by Composing their Metamodels

Anas Abouzahra, Ayoub Sabraoui, Karim Afdel
2018 Advances in Science, Technology and Engineering Systems  
This paper provides a composition rules based code generator facility for extending DSMLs.  ...  This can be reduced by the reuse of existing DSMLs to compose new ones trough a metamodel composition approach.  ...  Acknowledgment We express our respected gratitude goes to Ibn Zohr University, LabSIV laboratory, Ibn Zohr Doctoral Study Center and Faculty of Sciences of Ibn Zohr University for funding this research  ... 
doi:10.25046/aj030644 fatcat:wexxmriqnra5ffffayzd4cbwmy

Epistemology, emulators, and extended minds

Terry Dartnall
2004 Behavioral and Brain Sciences  
ACKNOWLEDGMENTS This work was supported in part by a National Institute of Neurological Disorders and Stroke (NINDS) Intramural Competitive Fellowship Award; and by a Grants-in-Aid for Scientific Research  ...  Since the 1960s the data-processing community has been fascinated by the appearance of the new filtering technique (Kalman & Bucy 1961) , which had naturally extended Wiener's filtering theory into the  ...  The art of representation: Support for an enactive approach Natika Newton Department of Philosophy, Nassau Hall, Nassau Community College, Garden City, NY 11733. natika@worldnet.att.net Abstract: Grush  ... 
doi:10.1017/s0140525x04260095 fatcat:jjrqtmnsp5gujdqbrb262hpj5a

Millions of Little Minions: Using Packets for Low Latency Network Programming and Visibility (Extended Version) [article]

Vimalkumar Jeyakumar, Mohammad Alizadeh, Yilong Geng, Changhoon Kim,, David Mazières
2014 arXiv   pre-print
Opinions, findings, and conclusions do not necessarily reflect the views of NSF or other sponsors.  ...  In particular, we walk through using TPPs to count the number of unique source IP addresses that communicate over all network links in the core of the network ( §2.5). • Network Control: We also demonstrate  ...  Background on a Switch Pipeline We begin with an abstract model of a switch execution environment shown in Figure 6 . The packet flows from input to output(s) through many pipelined modules.  ... 
arXiv:1405.7143v3 fatcat:3uccdh5cfrfthmqn4gqnjrafw4

Leveraging intersections in management theory and practice (Extended Abstracts)

MARTA UGOLINI
2021 Sinergie Italian Journal of Management  
Balancing theory and practice: a review of the state of PLS-SEM research by the community of Italian management scholars FRANCESCA MAGNO, FABIO CASSIA " Co-creation of value in Open Innovation: does coopetition  ...  BARBARA AQUILANI, CORRADO GATTI, IRENE FULCO " Forming an Ecosystem through an Incumbent's Strategic Transformation VALENTINA GARBIN, ALBERTO NUCCIARELLI, ERICA SANTINI " Ethnic diversity, recombinant  ...  LI L. (2018), "Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things", IEEE Wireless Communications, vol. 22, n. 6,.  ... 
doi:10.7433/srecp.ea.2021.01 fatcat:l2upsdqpqvc3zgahty45hquici

A Survey of Smart Contract Formal Specification and Verification [article]

Palina Tolmach, Yi Li, Shang-Wei Lin, Yang Liu, Zengxiang Li
2021 arXiv   pre-print
Given the significance of smart contracts in supporting important activities across industry sectors including supply chain, finance, legal and medical services, there is a strong demand for verification  ...  Yet, the vast majority of smart contracts lack any kind of formal specification, which is essential for establishing their correctness.  ...  Inter-transactional verification helps to uncover smart contract vulnerabilities that are composite, i.e., the vulnerability can only be exploited through a sequence of transactions [49] .  ... 
arXiv:2008.02712v3 fatcat:ltkckg4eivdhtppaebnlis3tci

Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? [chapter]

Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci
2010 Lecture Notes in Computer Science  
Java card technology have progressed at the point of running web servers and web clients on a smart card.  ...  We propose in this paper to apply the notion of security-by-contract (S×C), that is a specification of the security behavior of an application that must be compliant with the security policy of the hosting  ...  In [9, 17] Huisman et al. presented a formal framework and a tool set for compositional verification of application interactions on a multi-application smart card.  ... 
doi:10.1007/978-3-642-12368-9_16 fatcat:ulmzr7d25bgvtoqxftjzazlzs4

The 1+5 Architectural Views Model in Designing Blockchain and IT System Integration Solutions

Tomasz Górski
2021 Symmetry  
In the case of blockchain, the author has proposed the smart contract design pattern. The paper describes three case studies that have employed the model to design various solutions.  ...  Communication between systems requires flows that arrange mediation mechanisms. The paper describes an integration flow diagram that extends a UML activity diagram.  ...  Conflicts of Interest: The author declares no conflict of interest.  ... 
doi:10.3390/sym13112000 fatcat:lvp5trlb5varfeb227cqqftwqe
« Previous Showing results 1 — 15 out of 4,874 results