231 Hits in 3.5 sec

From Event-B Models to Dafny Code Contracts [chapter]

Mohammadsadegh Dalvandi, Michael Butler, Abdolbaghi Rezazadeh
2015 Lecture Notes in Computer Science  
Finally, a tool for automatic generation of Dafny contracts from Event-B formal models is presented.  ...  We presented a small case study to demonstrate this approach and outline of the rules for transforming Event-B events to Dafny contracts.  ...  Transforming Event-B Models to Dafny Contracts In this section we describe how we generate Dafny contracts from Event-B events.  ... 
doi:10.1007/978-3-319-24644-4_21 fatcat:mt5ms25bn5cj7mjovfmcvby5yu

Transforming Event-B Models to Dafny Contracts

Mohammadsadegh Dalvandi, Michael Butler, Abdolbaghi Rezazadeh
2015 Electronic Communications of the EASST  
The link transforms Event-B models to Dafny contracts by providing a framework in which Event-B models can be implemented correctly.  ...  The paper presents a method for transformation of Event-B models of abstract data types to Dafny contracts. Also a prototype tool implementing the transformation method is outlined.  ...  At the end the generated code from the Event-B model is verified against the code contracts in Spec#.  ... 
doi:10.14279/tuj.eceasst.72.1021 dblp:journals/eceasst/DalvandiBR15 fatcat:hwweobnyifgplpvylzwtprb32y

Code generation for Event-B

Víctor Rivera, Néstor Cataño, Tim Wahls, Camilo Rueda
2015 International Journal on Software Tools for Technology Transfer (STTT)  
generate Dafny code from Event-B proof obligations.  ...  To compare our tool with existing tools for generating Java code from Event-B models.  ...  Chapter 6 -Translating Event-B Machines Proof Obligations to Dafny The Variant Proof Obligation: it states that each convergent event decreases the numeric variant, and each anticipated event does not  ... 
doi:10.1007/s10009-015-0381-2 fatcat:6zktb6u6trhobl4nzqg4rnxca4

Code Generation for Event-B [article]

Victor Rivera
2016 arXiv   pre-print
We used the tool to translate several Event-B models. It generated JML-annotated Java code for all the considered models that serve as initial implementation.  ...  EventB2Java enables users to start the software development process in Event-B, where users can model the system and prove its consistency, to then transition to JML-annotated Java code, where users can  ...  from Event-B models.  ... 
arXiv:1602.02004v1 fatcat:xxpeia2gpzc5rhckllafzispqm

Derivation of algorithmic control structures in Event-B refinement

Mohammadsadegh Dalvandi, Michael Butler, Abdolbaghi Rezazadeh
2017 Science of Computer Programming  
This makes it difficult to identify and apply rules for transformation of Event-B models to sequential code.  ...  Abstract The Event-B formalism allows program specifications to be modelled at an abstract level and refined towards a concrete model.  ...  Acknowledgement We would like to thank anonymous reviewers for their careful reading of the paper and their comments and suggestions.  ... 
doi:10.1016/j.scico.2017.05.010 fatcat:djjzchigwngotd6i4mgorytoji

Formal Verification of Solidity contracts in Event-B [article]

Jian Zhu, Kai Hu, Mamoun Filali, Jean-Paul Bodeveix, Jean-Pierre Talpin
2020 arXiv   pre-print
This paper proposes a method to meet such requirements by translating Solidity contracts to Event-B models, supporting certification.  ...  To that purpose, we define a restrained Solidity subset and a transfer function which translates Solidity contracts to Event-B models.  ...  We have put the source code of the whole Event-B model on the GitHub website [10], where we also have put another verified Event-B model translated from a famous and typical Solidity contract named SafeRemotePurchase  ... 
arXiv:2005.01261v2 fatcat:lxt6gxamjbeprn3t4ujpifzhwy

Static versus Dynamic Verification in Why3, Frama-C and SPARK 2014 [chapter]

Nikolai Kosmatov, Claude Marché, Yannick Moy, Julien Signoles
2016 Lecture Notes in Computer Science  
We emphasize the specific feature of ghost code which turns out to be extremely useful for both static and dynamic verification.  ...  We review these differences and the issues that result from these choices.  ...  Counterexamples from SMT models A first solution is to exploit the SMT solvers' capability of generating models.  ... 
doi:10.1007/978-3-319-47166-2_32 fatcat:7lzkiav36ndsrkkhal6phvnwam

Proceedings of the Third Workshop on Formal Integrated Development Environment

Kim G. Larsen
2017 Electronic Proceedings in Theoretical Computer Science  
This work was funded by institutional research grant IUT2-1 from the Estonian Research Council. Acknowledgment.  ...  We would like to put our preliminary results of our proposed approach together and evaluate (1) whether DSE is applicable to SPLs in order to e ciently derive the behavioural changes among di↵erent products  ...  Table 1 contains the results from applying DARe to 141 programs available from the Dafny library 5 .  ... 
doi:10.4204/eptcs.240.0.1 fatcat:imfjolcxmrfm7kqiz523rbyj5i

An Empirical Study on the Correctness of Formally Verified Distributed Systems

Pedro Fonseca, Kaiyuan Zhang, Xi Wang, Arvind Krishnamurthy
2017 Proceedings of the Twelfth European Conference on Computer Systems - EuroSys '17  
Through code review and testing, we found a total of 16 bugs, many of which produce serious consequences, including crashing servers, returning incorrect results to clients, and invalidating verification  ...  Our results revealed that these assumptions referred to a small fraction of the trusted computing base, mostly at the interface of verified and unverified components.  ...  This work was supported in part by DARPA under contract FA8750-16-2-0032.  ... 
doi:10.1145/3064176.3064183 dblp:conf/eurosys/FonsecaZWK17 fatcat:oqryjfoo4zarnbregbo2gk7gzm

Seamless Requirements [article]

Alexandr Naumchev, Bertrand Meyer
2017 arXiv   pre-print
Popular notations for functional requirements specifications frequently ignore developers' needs, target specific development models, or require translation of requirements into tests for verification;  ...  Seamless Requirements, a new approach to specifying functional requirements, contributes to developers' understanding of requirements and to software quality regardless of the process, while the process  ...  Acknowledgement The authors are thankful to the administration of Innopolis University for the funding that made this work possible.  ... 
arXiv:1704.04189v1 fatcat:dfgdckzahbbgbmjsbevywpg2j4

On Models and Code [chapter]

Marieke Huisman
2018 Lecture Notes in Computer Science  
In this abstract, I analyse why this is case, and I argue that in order to solve this, we need to soften the border between models and code.  ...  This has two important advantages: (1) it would make it easier to reason about high-level behaviour of programs, using deductive verification, and (2) it would allow to reason about incomplete applications  ...  [9] , which aims at extracting code and annotations from an Event-B-model and then proving these correct using Dafny, and (2) the work of Tran-Jörgensen et al.  ... 
doi:10.1007/978-3-030-03418-4_7 fatcat:vg4ipsvrs5e5rdslxtgklhhzqe

Online Detection of Effectively Callback Free Objects with Applications to Smart Contracts [article]

Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, Yoni Zohar
2018 arXiv   pre-print
By running the history of all execution traces in Ethereum, we were able to verify that virtually all existing contracts, excluding the DAO or contracts with similar known vulnerabilities, are ECF.  ...  The famous DAO bug in the cryptocurrency framework Ethereum, employed callbacks to steal 150M.  ...  The research leading to these results has received funding from the European Research Council under the European Union's Seventh Framework Programme (FP7/2007-2013) / ERC grant agreement n • [321174],  ... 
arXiv:1801.04032v1 fatcat:3uqx4gsk65gfzpeqp6yvk72g2a

Behavioral interface specification languages

John Hatcliff, Gary T. Leavens, K. Rustan M. Leino, Peter Müller, Matthew Parkinson
2012 ACM Computing Surveys  
Behavioral interface specication languages provide formal code-level annotations such as pre-/postconditions, invariants, and assertions that allow programmers to express the intended behavior of program  ...  When used in conjunction with automated analysis and program verication tools, such specications can support detection of common code vulnerabilities, capture of light-weight application-specic semantic  ...  Such specications are also important for maintenance, since code alone cannot reveal what contract the code was intended to fulll.  ... 
doi:10.1145/2187671.2187678 fatcat:rzy5c4pm6fddzkcfce5yrhctve

Verified Change [chapter]

Klaus Havelund, Rahul Kumar
2016 Lecture Notes in Computer Science  
We present the textual wide-spectrum modeling and programing language K, which has been designed for representing graphical SysML models, in order to provide semantics to SysML, and pave the way for analysis  ...  of SysML models.  ...  We would like to thank Chris Delp and Bradley Clement for the opportunities and insights they provided during the development of the K language.  ... 
doi:10.1007/978-3-319-46508-1_5 fatcat:6rfnqc4ywvgafmsliyakhmecuq

Towards a Unified View of Modeling and Programming [chapter]

Manfred Broy, Klaus Havelund, Rahul Kumar
2016 Lecture Notes in Computer Science  
This leads to the observation, that programming languages could be used for modeling, if only appropriate modifications were made to these languages.  ...  At the same time, model-based engineering formalisms such as UML and SysML are highly popular in engineering communities due to their graphical nature.  ...  Furthermore, the connection between models and code is fragile, relying on the correctness of translators from for example UML state machines to code.  ... 
doi:10.1007/978-3-319-47169-3_17 fatcat:fh3plvzp6za7veg2o4p36jr5jm
« Previous Showing results 1 — 15 out of 231 results