1,317 Hits in 6.9 sec

Practice-Oriented Formal Methods To Support The Software Development Of Industrial Control Systems

Dániel Darvas, István Majzik, Enrique Blanco Viñuela
2017 Zenodo  
Model checking, one of the main formal verification techniques, is computationally difficult, therefore the analysis of non-trivial systems requires special considerations.  ...  Furthermore, the mainly academic tools implementing different model checking algorithms are not suitable for users who are not experts in formal methods.  ...  Although the use of model checking for PLC-based industrial control software was already studied in e.g.  ... 
doi:10.5281/zenodo.162950 fatcat:inhxspfq7ndkfifxuq3zgbpt2i

Embedded $\mathcal{EL}$ + Reasoning on Programmable Logic Controllers [chapter]

Stephan Grimm, Michael Watzke, Thomas Hubauer, Falco Cescolini
2012 Lecture Notes in Computer Science  
We report on initial runtime experiments carried out on a prototypical implementation of a PLC-based EL + -reasoner in the context of a use case about turbine diagnostics.  ...  However, due to the memory and CPU restrictions of embedded devices like programmable logic controllers (PLCs), state-ofthe-art reasoning tools and methods cannot be easily migrated to industrial automation  ...  On this basis, the Software PLC SIMATIC WinLC (Windows Logic Controller) RTX v4.4.1 SP1 performs the tasks of a S7-300 or S7-400 PLC in our setting.  ... 
doi:10.1007/978-3-642-35173-0_5 fatcat:frksvxqqy5dgbk23o5kz7dd6uq

Formal Verification of Evolutionary Changes [chapter]

Bernhard Beckert, Jakob Mund, Mattias Ulbrich, Alexander Weigl
2019 Managed Software Evolution  
, generalised test tables, and model checking of holistic (multidomain) models.  ...  Here, we describe the logical foundations and technical aspects of the applied formal verification techniques and their applications; their benefits for the user, as far as system and model comprehensibility  ...  If the input value keeps being out of range for a specified number of cycles, then the function block raises an alarm via the variable W.  ... 
doi:10.1007/978-3-030-13499-0_11 fatcat:5rcrtm2aenaajcpzah4jw6ubge

Improving Automation Software Dependability: A Role for Formal Methods?

Timothy L. Johnson
2004 IFAC Proceedings Volumes  
The growth of manufacturing control software from simple NC and PLC-based systems to concurrent networked systems incorporating PC's, PLC's and CNC's has created new challenges to the maintenance of safe  ...  Key milestones in this evolution, and the prospects for the use of formal verification methods in achieving enhanced dependability of future manufacturing software, are examined in this paper and presentation  ...  ) dynamic software modifications.  ... 
doi:10.1016/s1474-6670(17)36112-8 fatcat:ylktfkn4g5astcjmjs32ccovry

The CLEARSY Safety Platform: 5 Years of Research, Development and Deployment [article]

Thierry Lecomte, David Deharbe, Paulin Fournier, Marcel Oliveira
2020 arXiv   pre-print
The CLEARSY Safety Platform (CSSP) was designed to ease the development of safety critical systems and to reduce the overall costs (development, deployment, and certification) under the pressure of the  ...  Summarizing a 5-year return of experience in the effective application in the railways, this article explains how this approach is a game-changer and tries to anticipate the future of this platform for  ...  A module is used to break down a large software into smaller parts. A module has a specification (called a machine) where are formalized both a static and a dynamic description of the requirements.  ... 
arXiv:2005.10662v1 fatcat:6ic5m76nlranxmdeekvs7xlkp4

A functional genomic and proteomic perspective of sea urchin calcium signaling and egg activation

Michelle M. Roux, Ian K. Townley, Michael Raisch, Anna Reade, Cynthia Bradham, Glen Humphreys, Herath Jayantha Gunaratne, Christopher E. Killian, Gary Moy, Yi-Hsien Su, Charles A. Ettensohn, Fred Wilt (+4 others)
2006 Developmental Biology  
The initial release of Ca 2+ serves to coordinate egg activation, which is largely a phenomenon of post-translational modifications, especially dynamic protein phosphorylation.  ...  Within seconds of sperm-egg interaction, calcium is released from the egg endoplasmic reticulum, launching the zygote into the mitotic cell cycle and the developmental program.  ...  Work in the laboratory of VDV is funded by the NIH (HD12986). Work in the laboratory of KRF is funded by the NSF (IBN-0415581). MMR was supported by an NSF Predoctoral Fellowship.  ... 
doi:10.1016/j.ydbio.2006.09.006 pmid:17054939 fatcat:zhf3ub5kxvez3dpt2727f2lrgi

G4LTL-ST: Automatic Generation of PLC Programs [article]

Chih-Hong Cheng, Chung-Hao Huang, Harald Ruess, Stefan Stattelmann
2014 arXiv   pre-print
G4LTL-ST automatically synthesizes control code for industrial Programmable Logic Controls (PLC) from timed behavioral specifications of input-output signals.  ...  G4LTL-ST generates code in IEC 61131-3-compatible Structured Text, which is compiled into executable code for a large number of industrial field-level devices.  ...  Moreover, the semantics of temporal specifications in G4LTL-ST is slightly different from the standard semantics as used in model checking, since the execution model of PLCs is based on the concept of  ... 
arXiv:1405.2409v2 fatcat:rla232rupnhrpbkw2n7inlgtcm

IC3 software model checking

Tim Lange, Martin R. Neuhäußer, Thomas Noll, Joost-Pieter Katoen
2019 International Journal on Software Tools for Technology Transfer (STTT)  
In order to prevent such erroneous behaviour model checking, a formal verification technique for determining functional properties of information and communication systems, has proven to be highly useful  ...  In times where computers become ever smaller and more powerful and software becomes more complex and advances even deeper into every aspect of our lives, the risk of software misbehaviour and the resulting  ...  Tree-IC3 Therefore [Cimatti and Griggio, 2012] propose another, more advanced approach to software model-checking via IC3.  ... 
doi:10.1007/s10009-019-00547-x fatcat:qvwb3rcfxjcffkyy53nd2fwq5q

Behavioral types for component-based software systems

Jan Olaf Blech
2017 Proceedings of the Australasian Computer Science Week Multiconference on - ACSW '17  
In this paper, we particularly introduce the formal definition of behavioral types that are associated with system components in order to specify their expected behavior.  ...  Behavioral types for space-aware systems are proposed as a means to facilitate the development, commissioning, maintenance, and refactoring of systems with cyber-physical characteristics.  ...  The ESMs do not only facilitate the integration of the building blocks into their environment but make also compositional model checking of the building blocks possible.  ... 
doi:10.1145/3014812.3014842 dblp:conf/acsw/Blech17 fatcat:w6abqibbvjatjb22ygy7ow2dja


Tomas Bures, Ilias Gerostathopoulos, Petr Hnetynka, Jaroslav Keznikl, Michal Kit, Frantisek Plasil
2013 Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering - CBSE '13  
In this paper we propose a new class of component systems (Ensemble-Based Component Systems -EBCS) which bind autonomic components with cyclic execution via dynamic component ensembles controlling data  ...  Engineering of such systems is very complex because of their inherent dynamicity, open-endedness, and autonomicity.  ...  This work was partially supported by the EU project ASCENS 257414 and the Grant Agency of the Czech Republic project P202/11/0312.  ... 
doi:10.1145/2465449.2465462 dblp:conf/cbse/BuresGHKKP13 fatcat:ixnj7aytfjghfkr6jkhmvnlllq

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
First, we review the main contents of the selected papers and classify them into 24 topics.  ...  Finally, we also perform a statistical analysis in terms of paper publication times, author institutes, countries, and sponsors to show the current worldwide CPS security research situation.  ...  In addition, it ensures the confidentiality and integrity of software with hardware-supported integrity checks, which use loader modules to decrypt a protected software module only when the integrity of  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

A case study of planning for smart factories

Stefan Edelkamp, Christoph Greulich
2018 International Journal on Software Tools for Technology Transfer (STTT)  
In this work, we propose the application of the SPIN software model checker to a multiagent system that controls the industrial production of goods.  ...  It derives valid and optimized plans with several thousands of steps using constraint branching in branch-and-bound search.  ...  The algorithmic contribution of this text is general costoptimization via constraint branch-and-bound.  ... 
doi:10.1007/s10009-018-0498-1 fatcat:xsktxjkbbfhjnlihpabimvsfh4

ArduCode: Predictive Framework for Automation Engineering [article]

Arquimedes Canedo and Palash Goyal and Di Huang and Amit Pandey and Gustavo Quiros
2020 arXiv   pre-print
Automation engineering is the task of integrating, via software, various sensors, actuators, and controls for automating a real-world process.  ...  Finally, we use autoencoder models for hardware recommendation and achieve a p@3 of 0.79 and p@5 of 0.95.  ...  Similarly, the authors in [22] present Arcade.PLC, a framework for the verification and analysis of PLC code that combines model-checking and static analysis.  ... 
arXiv:1909.04503v4 fatcat:2kfya3t7knhl7bdqqvrg6ke4km

Finding Software Bugs in Embedded Devices [chapter]

Aurélien Francillon, Sam L. Thomas, Andrei Costin
2021 Security of Ubiquitous Computing Systems  
This chapter discusses how software vulnerabilities can be identified, at different stages of the software life-cycle, for example during development, during integration of the different components, during  ...  Embedded software has a number of particularities which makes it slightly different to general purpose software.  ...  This limits the size of the programs which can be analyzed. In [156] , the authors perform device-less dynamic security analysis via automated and large-scale emulation of embedded firmware.  ... 
doi:10.1007/978-3-030-10591-4_11 fatcat:i6qrvggrlbak7bntqljgfjerqi

A safety-focused verification using software fault trees

Sungdeok Cha, Junbeom Yoo
2012 Future generations computer systems  
We evaluated the feasibility of FTA's applicability as a verification tool on a prototype model of a nuclear power reactor protection system (RPS) software to be deployed in plants under construction in  ...  As a fault tree represents an abstract and partial behavioral model of software on credible causes leading to a hazard, it must still satisfy various properties (e.g., fairness, correctness).  ...  It uses Verilog as a front end and supports fair CTL (Computational Tree Logic) model checking, language emptiness checking, combinational equivalence checking, sequential equivalence checking, cycle-base  ... 
doi:10.1016/j.future.2011.02.004 fatcat:xmm5vg425nggbft5llglj2nrnq
« Previous Showing results 1 — 15 out of 1,317 results