25,456 Hits in 3.3 sec

Java Program Verification Challenges [chapter]

Bart Jacobs, Joseph Kiniry, Martijn Warnier
2003 Lecture Notes in Computer Science  
This paper aims to raise the level of verification challenges by presenting a collection of sequential Java programs with correctness annotations formulated in JML.  ...  The emphasis lies more on the underlying semantical issues than on verification.  ...  9 We do not have answers for these questions, though investigations are underway [8] . 10 The verification of the method isqrt() from Figure 11 uses the implementation of the absolute value method  ... 
doi:10.1007/978-3-540-39656-7_8 fatcat:wg4h2n3bhff6vhayc4caxcvnle

Deductive Software Verification: From Pen-and-Paper Proofs to Industrial Tools [chapter]

Reiner Hähnle, Marieke Huisman
2019 Lecture Notes in Computer Science  
Deductive software verification aims at formally verifying that all possible behaviors of a given program satisfy formally defined, possibly complex properties, where the verification process is based  ...  We take stock of the state-of-art and give a list of the most important challenges for the further development of the field of deductive software verification.  ...  Boogie is used as the intermediate verification language for various programming languages, including Java (in OpenJML), Java bytecode [86] , and C# (in Spec#).  ... 
doi:10.1007/978-3-319-91908-9_18 fatcat:t3verkvbx5givfekzmbpiw6zla

Synergies among Testing, Verification, and Repair for Concurrent Programs (Dagstuhl Seminar 16201)

Julian Dolby, Orna Grumberg, Peter Müller, Omer Tripp, Marc Herbstritt
2016 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 16201 "Synergies among Testing, Verification, and Repair for Concurrent Programs".  ...  This seminar builds upon, and is inspired by, several past seminars on program testing, verification, repair and combinations thereof.  ...  We present actor services [1] : a novel program logic for defining and verifying response and functional properties of programs which communicate via asynchronous messaging.  ... 
doi:10.4230/dagrep.6.5.56 dblp:journals/dagstuhl-reports/DolbyGMT16 fatcat:3ou6mdvytrfnfhjf542sbpn6lm

Challenge benchmarks for verification of real-time programs

Tomas Kalibera, Pavel Parizek, Ghaith Haddad, Gary T. Leavens, Jan Vitek
2010 Proceedings of the 4th ACM SIGPLAN workshop on Programming languages meets program verification - PLPV '10  
This papers presents open challenges for verification of real-time systems in the context of the Real-time Specification for Java.  ...  Real-time systems, and in particular safety-critical systems, are a rich source of challenges for the program verification community as software errors can have catastrophic consequences.  ...  Thus the challenge to the programming language and programming verification communities is to come up with languages, methodologies and tools that can scale to real systems and provide the kinds of guarantees  ... 
doi:10.1145/1707790.1707800 dblp:conf/plpv/KaliberaPHLV10 fatcat:exw44v56fbhkdcu7nhof74b6ca

Challenge proposal

Max Schäfer, Torbjörn Ekman, Oege de Moor
2008 Proceedings of the 3rd workshop on Programming languages meets program verification - PLPV '09  
We argue that software refactoring tools are a prime candidate for mechanical verification, offering significant challenges but also the prospect of tangible benefits for real-world software development  ...  They are most useful for gradually improving large existing code bases and it is essential that they work reliably, since even a simple refactoring may affect many different parts of a program, and the  ...  We believe formalising and verifying refactoring tools is an interesting and novel challenge for language-based program verification.  ... 
doi:10.1145/1481848.1481859 dblp:conf/plpv/SchaferEM09 fatcat:e66bjrk4rjhcnhqzb4dmtznmpi

History-based specification and verification of Java collections in KeY (keynote)

Frank S. de Boer, Hans-Dieter A. Hiep
2020 Proceedings of the 22nd ACM SIGPLAN International Workshop on Formal Techniques for Java-Like Programs  
However, some methods are challenging for verification, namely those involving parameters of interface type.  ...  The state-of-the-art KeY system can be used to formally reason about program correctness of Java programs. Recently, KeY has been used to show major flaws in the Java Collection Framework.  ...  We further discussed some of the challenges of proving client code correct with respect to arbitrary implementations, and a practical specification and verification effort of part of the Collection interface  ... 
doi:10.1145/3427761.3432349 fatcat:ti2f3shii5hfllw7k3nrmy5zea

Extended Static Checking: A Ten-Year Perspective [chapter]

K. Rustan M. Leino
2001 Lecture Notes in Computer Science  
Finding errors in the program is then done by mechanically searching for counterexamples to the verification condition.  ...  A powerful approach to finding errors in computer software is to translate a given program into a verification condition, a logical formula that is valid if and only if the program is free of the classes  ...  For example, consider a Java program that contains the following assignment statement: To use the labeling mechanism, the subpredicate p = null in this verification condition is instead written as the  ... 
doi:10.1007/3-540-44577-3_11 fatcat:ubh6gkw5wber5h2abpzmkgcpri

Implementation-level verification of algorithms with KeY

Daniel Bruns, Wojciech Mostowski, Mattias Ulbrich
2013 International Journal on Software Tools for Technology Transfer (STTT)  
Building on our solutions, we argue that verification systems which target implementations in real-world programming languages better have powerful abstraction capabilities.  ...  It consisted of three algorithms which the authors have implemented in Java, specified with the Java Modeling Language, and verified using the KeY system.  ...  Acknowledgements The work of Daniel Bruns is supported by the German National Science Foundation (DFG) under project "Programlevel Specification and Deductive Verification of Security Properties" within  ... 
doi:10.1007/s10009-013-0293-y fatcat:3iaf6y27cnaihhloy3yagbtn2e

Requirement and Result of Verifying the Program Code

Er. Abhishek Pandey, Prof. Roshni Dubey
2014 International Journal of Computer Trends and Technology  
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake.  ...  By appropriately applying multiple proof techniques to discharge different sub formulas, this reasoning system can effectively prove the complex and challenging verification conditions that arise in this  ...  A subset of Java is chosen as the implementation language because it is a familiar, imperative, memory-safe language and existing Java tools can be used to write and compile the programs.  ... 
doi:10.14445/22312803/ijctt-v9p112 fatcat:nyl4ze7f2rgwfg62lrfrsh4fhu

Practical symbolic verification of regular properties

Hengbiao Yu
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
It is challenging to verify regular properties of programs. This paper presents symbolic regular verification (SRV), a dynamic symbolic execution based technique for verifying regular properties.  ...  We have implemented SRV for Java and evaluated it on 16 real-world open-source Java programs (totaling 270K lines of code).  ...  It is challenging to verify regular properties for real-world programs in software engineering.  ... 
doi:10.1145/3106237.3121275 dblp:conf/sigsoft/Yu17 fatcat:watm5dgihncg5fuiq5nmabjdpy

Source code verification of a secure payment applet

Bart Jacobs, Martijn Oostdijk, Martijn Warnier
2004 The Journal of Logic and Algebraic Programming  
This paper discusses a case study in formal verification and development of secure smart card applications.  ...  The applet features a challenge-response mechanism which allows legitimate terminals to increase the balance by putting the applet into a special operation mode.  ...  The second level is the low concrete level of program code (in the case of this paper Java Card [7] source code).  ... 
doi:10.1016/j.jlap.2003.07.007 fatcat:65pnzolwzbh5dawbfhdrporznu

Trends and Challenges in Algorithmic Software Verification [chapter]

Rajeev Alur
2008 Lecture Notes in Computer Science  
Recent years have witnessed remarkable progress in principles and tools for automated software verification.  ...  In this position paper, I briefly discuss the relevant projects in my group, and outline some near-term challenges for the community as concrete milestones for measuring progress.  ...  Consequently, developing such automatic graders is an interesting challenge for the verification technology.  ... 
doi:10.1007/978-3-540-69149-5_26 fatcat:eig3aaqlhrf7pi5gqxx2kd62py

Verify Your Runs [chapter]

Klaus Havelund, Allen Goldberg
2008 Lecture Notes in Computer Science  
The Java-MOP system described in [14] is a generalized framework for instrumenting Java programs specifically for runtime verification.  ...  In more recent work we decided to develop a runtime verification framework for Java in Java.  ... 
doi:10.1007/978-3-540-69149-5_40 fatcat:pfznp4n7lng4nfczz74bwafjue

The COST IC0701 Verification Competition 2011 [chapter]

Thorsten Bormer, Marc Brockschmidt, Dino Distefano, Gidon Ernst, Jean-Christophe Filliâtre, Radu Grigore, Marieke Huisman, Vladimir Klebanov, Claude Marché, Rosemary Monahan, Wojciech Mostowski, Nadia Polikarpova (+5 others)
2012 Lecture Notes in Computer Science  
This paper reports on the experiences with the program verification competition held during the FoVeOOS conference in October 2011. There were 6 teams participating in this competition.  ...  We discuss the three different challenges that were posed and the solutions developed by the teams.  ...  and 2) Java programs.  ... 
doi:10.1007/978-3-642-31762-0_2 fatcat:jt5hy4ioevewfcubpq4lq4o4qu

Guest editors' introduction: Special issue on Formal Methods for Smart Cards

Marieke Huisman, Thomas Jensen
2004 The Journal of Logic and Algebraic Programming  
This verification is a fundamental part of the security architecture of Java Card.  ...  Klein and Strecker have focused on the byte code verification that takes place before an applet is executed by the Java virtual machine.  ...  The article by Jacobs et al. details a case study in applet verification using the LOOP tool. They study a Java Card electronic purse applet that uses a challenge-response mechanism.  ... 
doi:10.1016/j.jlap.2003.07.002 fatcat:pztnie3j2nh5zmy3e33v4iesba
« Previous Showing results 1 — 15 out of 25,456 results