5,777 Hits in 5.0 sec

Verifying Cross-layer Interactions through Formal Model-based Assertion Generation

Asieh Salehi Fathabadi, Mohammadsadegh Dalvandi, Michael Butler, Bashir M. Al-Hashimi
2019 IEEE Embedded Systems Letters  
Our approach involves a formal model of the APIs, developed using the Event-B formal method which is automatically translated to a set of assertions and embedded in the existing implementation of APIs.  ...  In this paper, we propose a formal approach to integration testing through automatic generation of runtime assertions in order to test the implementation of the APIs.  ...  Our integration testing approach consists of three stages: 1) formal modelling of the framework APIs in Event-B language, 2) formal verification of consistency properties (including order of API calls  ... 
doi:10.1109/les.2019.2955316 fatcat:57ncegiszffbvawf4m3sdzsg54

Towards Runtime Verification via Event Stream Processing in Cloud Computing Infrastructures [article]

Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, Angela Scibelli
2020 arXiv   pre-print
To face these issues, we propose a lightweight approach to runtime verification, for monitoring and failure detection of cloud computing systems.  ...  We performed a preliminary evaluation of the proposed approach in the OpenStack cloud management platform, an "off-the-shelf" distributed system, showing that the approach can be applied with high failure  ...  A={all distinct events of type "A" happened in [t, t+∆]} B ={all distinct events of type "B" happened in [t, t+∆]} (2) with |A|=|B|=n.  ... 
arXiv:2010.06607v1 fatcat:xaq4zxccgzh4pnsusqefwbqbam

Towards a Process Calculus for Rest: Current State of the Art

Dariusz Dwornikowski, Andrzej Stroiński, Jerzy Brzeziński
2015 Foundations of Computing and Decision Sciences  
In order to address problems of modeling and verification of Web services, several process calculi have been proposed for SOAP-based Web services but none for the RESTful Web services based systems.  ...  The aim of the article is to see how process calculi for SOAP-based systems deal with different aspects of their modeling domain, and whether their approaches can be used to model RESTful and ROA systems  ...  The aim for the Authors was to formalize REST and ROA behavior in order to provide an automated verification of a behavior of a RESTful service.  ... 
doi:10.1515/fcds-2015-0015 fatcat:lwxcsr2pezemzdshu3atwfx674

Modelling and Verifying a Priority Scheduler for an SCJ Runtime Environment [chapter]

Leo Freitas, James Baxter, Ana Cavalcanti, Andy Wellings
2016 Lecture Notes in Computer Science  
We present here the result of our verification of the scheduler of the only SCJ virtual machine up to date with the standard and publicly available, the icecap HVM.  ...  SCJ programs require the use of specialised virtual machines.  ...  The authors gratefully acknowledge useful feedback from anonymous referees, and Stephan Erbs Korsholm and Shuai Zhao for their help in understanding the icecap HVM and its rationale.  ... 
doi:10.1007/978-3-319-33693-0_5 fatcat:gnzetqyj3zd53ju26eumeatmwa

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA [article]

Antonio González-Burgueño, Damián Aparicio, Santiago Escobar, Catherine Meadows, José Meseguer
2018 arXiv   pre-print
This is not surprising, because both YubiKey and YubiHSM, which make use of cryptographic APIs, involve a number of complex features: (i) discrete time in the form of Lamport clocks, (ii) a mutable memory  ...  for storing previously seen keys or nonces, (iii) event-based properties that require an analysis of sequences of actions, and (iv) reasoning modulo exclusive-or.  ...  Figure 1 [18] is a simple example of a YubiKey API execution, where the three roles are as follows: the user (Browser), the service (YubiCloud), and the verification server running the YubiKey API.  ... 
arXiv:1806.07209v1 fatcat:c5f6eodqpfcezcivwc2f5clbhq

Formal Verification of an Efficient Architecture to Enhance the Security in IoT

Eman K. Elsayed, L. S., Asmaa. A.
2021 International Journal of Advanced Computer Science and Applications  
As well as using various Event-B properties like formal verification, functional checks, and model checkers to design different formal spoofing attacks for the IoT environment.  ...  During this paper, a framework in the Event-B formal method will be used to design a formal description of the secure IoT architecture to cover the security properties of the IoT architecture.  ...  for refinements and invariants used for verification of required security properties. • Detecting some IoT security attacks using Event-B formal method.  ... 
doi:10.14569/ijacsa.2021.0120317 fatcat:4sddznlnmjhjdlgsqpsemlskxu

A reactive architecture for cloud-based system engineering

David Adjepon-Yamoah, Alexander Romanovsky, Alexei Iliasov
2015 Proceedings of the 2015 International Conference on Software and System Process - ICSSP 2015  
The architecture uses the Open Services for Lifecycle Collaboration (OSLC) technology to create a reactive middleware that informs all stakeholders about any changes in the development artefacts.  ...  The architecture includes an open toolbox which provides tools as a service to support various phases of system engineering.  ...  deployment of formal verification in industry.  ... 
doi:10.1145/2785592.2785611 dblp:conf/ispw/Adjepon-YamoahR15 fatcat:dq5mkyg6wzeh3kokvqp2klrqiu

From Requirements Engineering to Safety Assurance: Refinement Approach [chapter]

Linas Laibinis, Elena Troubitsyna, Yuliya Prokhorova, Alexei Iliasov, Alexander Romanovsky
2015 Lecture Notes in Computer Science  
Formal modelling and verification are widely used in the development of safety-critical systems. They aim at providing a mathematically-grounded argument about system safety.  ...  Our approach establishes a link between safety requirements, Event-B models and corresponding fragments of a safety case.  ...  In terms of Event-B, the particular system states we are interested in are usually associated with some desired post-states of specific model events.  ... 
doi:10.1007/978-3-319-25942-0_13 fatcat:ljblurbg4vc2nereld5v7erdjy

Poster: Automatic Consistency Checking of Requirements with ReqV

Simone Vuotto, Massimo Narizzano, Luca Pulina, Armando Tacchella
2019 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST)  
The main goal of the tool is to provide an easy-to-use environment for the verification of requirements in Cyber-Physical Systems (CPS).  ...  On the other hand, automated consistency checking most often requires overburdening formalizations. In this paper we introduce REQV, a tool for formal consistency checking of requirements.  ...  server application that provides services as REST APIs.  ... 
doi:10.1109/icst.2019.00043 dblp:conf/icst/VuottoNPT19 fatcat:6bbccspmsffpfbesbyh3oerpc4

Edge-based Runtime Verification for the Internet of Things

Christos Tsigkanos, Marcello M. Bersani, Pantelis A. Frangoudis, Schahram Dustdar
2021 IEEE Transactions on Services Computing  
intensity using state-of-the-art LPWAN technology.  ...  This paper presents a service-based software architecture and technical framework supporting runtime verification for widely deployed, volatile IoT systems.  ...  , for end-devices communicating using state-of-the-art LPWAN technology [5] .  ... 
doi:10.1109/tsc.2021.3074956 fatcat:j7kt5k6vv5azvmy7kcbbydp2cu

Trustworthy Memory Isolation of Linux on Embedded Devices [chapter]

Hamed Nemati, Mads Dam, Roberto Guanciale, Viktor Do, Arash Vahidi
2015 Lecture Notes in Computer Science  
We show that the direct paging mechanism can be implemented using a compact design, suitable for formal verification down to a low level of abstraction, without penalizing system performance.  ...  The verification is performed using the HOL4 theorem prover and uses a detailed model of the ARMv7-A ISA, including the MMU.  ...  Verification Approach The TLS models user mode execution of an arbitrary guest system on top of an ARMv7 CPU with MMU support, alternating with abstract handler events.  ... 
doi:10.1007/978-3-319-22846-4_8 fatcat:gv5qmeojtbgg5nedfbmo2mvbgq

A Collaborative Virtual Workspace for Factory Configuration and Evaluation

Ingo Zinnikus, Xiaoqi Cao, Matthias Klusch, Christopher Krauss, Andreas Nonnengart, Torsten Spieldenner, Philipp Slusallek
2013 Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Advanced tools need to support flexibility, specialization and collaborative evolution of the design where the exchange of knowledge between domain experts helps to improve informed decision making.  ...  The convergence of information technologies (IT) has enabled the Digital Enterprise in which engineering, production planning, manufacturing and sales processes are supported by IT-based collaboration,  ...  The verification itself is performed by the verification tool HAVLE 3 provided through a REST service.  ... 
doi:10.4108/icst.collaboratecom.2013.254053 dblp:conf/colcom/ZinnikusCKKNSS13 fatcat:mdxhouf32fbalmccwq7e4vwupy

Offline Runtime Verification of Safety Requirements using CSP [article]

Matt Luckcuck
2021 arXiv   pre-print
Dynamic formal verification is a key tool for providing ongoing confidence that a system is meeting its requirements while in use, especially when paired with static formal verification before the system  ...  is in use.  ...  Integrating formal methods with existing non-formal safety techniques is useful, often necessary [3] , and provides another tool for the verification toolbox.  ... 
arXiv:2007.03522v3 fatcat:ap3stj3tszfhrobleirx73hvba

A Collaborative VirtualWorkspace for Factory Configuration and Evaluation

Ingo Zinnikus, Sergiy Byelozyorov, Xiaoqi Cao, Matthias Klusch, Christopher Krauss
2014 EAI Endorsed Transactions on Collaborative Computing  
Advanced tools need to support flexibility, specialization and collaborative evolution of the design where the exchange of knowledge between domain experts helps to improve informed decision making.  ...  The convergence of information technologies (IT) has enabled the Digital Enterprise in which engineering, production planning, manufacturing and sales processes are supported by IT-based collaboration,  ...  Clients in turn do not operate directly on the verification's REST API anymore, but communicate with the integration server which in turn processes the messages to the verification service via the attached  ... 
doi:10.4108/cc.1.1.e5 fatcat:lefzzz4kybbzvkvo6pkxnlnkmy

ROSA: Resource-Oriented Service Management Schemes for Web of Things in a Smart Home

Chun-Feng Liao, Peng-Yu Chen
2017 Sensors  
of occupants and providing appropriate services accordingly.  ...  Consequently, the objective of this paper is to propose a set of novel WoT-driven plug-and-play service management schemes for a smart home called Resource-Oriented Service Administration (ROSA).  ...  Uri and Kedar's work pioneered the research on formalizing and verification of RESTful services.  ... 
doi:10.3390/s17102159 pmid:28934159 pmcid:PMC5677407 fatcat:g2kf2bzmxzaqhhaiaryvepv7ha
« Previous Showing results 1 — 15 out of 5,777 results