549,694 Hits in 4.0 sec

Tools and Verification [chapter]

Massimo Bartoletti, Luis Caires, Ivan Lanese, Franco Mazzanti, Davide Sangiorgi, Hugo Torres Vieira, Roberto Zunino
2011 Lecture Notes in Computer Science  
doi:10.1007/978-3-642-20401-2_19 fatcat:eft2ojsagvenjigmpekmw4u5uu

DataProVe: A Data Protection Policy and System Architecture Verification Tool [article]

Vinh Thong Ta
2020 arXiv   pre-print
The syntax of the policies and the architectures is based on semi-formal languages, and the automated verification engine relies on logic and resolution based proofs.  ...  The functionality and operation of the tool are presented using different examples.  ...  The automated conformance verification engine is detailed in Section 6. In Section 8 we present the DataProVe tool and its operation using two simple examples.  ... 
arXiv:2008.08936v4 fatcat:ccsw3ebl4vhijld3hnxtheeopu

D4.2 –Modeling and Verification Tools-Initial Version

Julien Signoles, Allan Blanchard, Bernard Botella, Taimoor Khan
2021 Zenodo  
This document is the deliverable D4.2 of ENSURESEC, which is the mid-term report of the ENSURESEC's Task T4.2 "Modeling and Verification Tools".  ...  It introducesthe main tool, namely Frama-C, on which this task is based, presents the first task results,and explains what remainsto be done.  ...  Tool Presentation ENSURESEC's task 4.2 "Modeling and Verification Tools" is fully based on Frama-C, a tool provided by CEA under an open source license.  ... 
doi:10.5281/zenodo.6323187 fatcat:rvdnnxg46rdrjiqbjhb6k3akji

Prolog for Verification, Analysis and Transformation Tools

Michael Leuschel
2020 Electronic Proceedings in Theoretical Computer Science  
Guided by experience in teaching and the development of verification tools like ProB or specialisation tools like ECCE and LOGEN, the article presents an assessment of various aspects of Prolog and provides  ...  This article examines the use of the Prolog language for writing verification, analysis and transformation tools.  ...  Tools Over the years I have written a variety of tools for verification and transformation, mainly using the Prolog programming language.  ... 
doi:10.4204/eptcs.320.6 fatcat:4ptzbt4pyfcirbfq6r7luzt6uq

Bus Protocols: MSC-Based Specifications and Translation into Program of Verification Tool for Formal Verification [article]

Kamrul Hasan Talukder
2010 arXiv   pre-print
In this paper, we present the way how we can specify the bus protocols using MSCs and how these specifications can be translated into program of verification tool (we have used Symbolic Model Verifier  ...  (SMV)) for the use of formal verification.  ...  For this, SMV is a very effective debugging tool as well as a formal verification system.  ... 
arXiv:1009.5087v1 fatcat:df3whcfn65dj3ijeubqnslpb5e

Debugging Program Verification Proof Scripts (Tool Paper) [article]

Bernhard Beckert and Sarah Grebing and and Alexander Weigl
2018 arXiv   pre-print
The tool is built on top of KeY, a system for deductive verification of Java programs.  ...  The debugger and its graphical user interface are designed to support program verification in particular, the underlying concepts and the implementation, however, are adaptable to other provers and proof  ...  Special thanks go to An Thuy Tien Luong who provided valuable comments concerning the usage of psdbg and the proof scripting language.  ... 
arXiv:1804.04402v1 fatcat:s5nwb5ne5zbfbieixkqwhm4hbq

Principles for Verification Tools: Separation Logic [article]

Brijesh Dongol and Victor B. F. Gomes and Georg Struth
2014 arXiv   pre-print
A principled approach to the design of program verification and con- struction tools is applied to separation logic.  ...  Verification conditions and transformation laws are derived by equational reasoning within the predicate transformer quantale.  ...  We are grateful for support by EPSRC grant EP/J003727/1 and the CNPq. The third author would like to thank Tony Hoare, Peter O'Hearn and Matthew Parkinson for discussions on separation logic.  ... 
arXiv:1410.4439v1 fatcat:7q7xha2wund3jghq6d2kp4xtxi


Amol H. Shinde, Umbarkar A.J., Pillai N.R.
2017 ICTACT Journal on Communication Technology  
In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.  ...  These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security.  ...  Paper reviewed the tools for the specification and verification of cryptographic protocols and will help the researchers review the protocol analysis tools.  ... 
doi:10.21917/ijct.2017.0226 fatcat:cjtshuv25rbvjggalyzy7xtdkq

Verification Tool and Unified Specifications for Embedded Software

Shunsuke Yatabe
2009 2009 Software Technologies for Future Dependable Distributed Systems  
In the extended abstract, our on-going research project Verification Tool and Unified Specifications for Embedded Software is explained.  ...  The tool is based on a proof assistant system (Agda) and a software development system (VDM tools), but is designed with the concept of lightweight formal methods.  ...  Keishi Okamoto, and in particular Dr. Yoshiki Kinoshita of Center for Verification and Semantics, National Institute of Advanced Industrial Science and Technology.  ... 
doi:10.1109/stfssd.2009.33 fatcat:263reuvpkzfzvpiwloqqxo2rry

Policy Analysis and Verification by Graph Transformation Tools

Francesco Parisi-Presicce, Yujie Zhao
2005 Electronical Notes in Theoretical Computer Science  
Here, we show how graph transformations can simulate PONDER policies and use the graph tools AGG and GROOVE to do the static and dynamic analysis.  ...  Graph transformations provide a good method to carry out the analysis and verification because of the intuitive representation of policies and the mature theory.  ...  We use PONDER policies [2, 1] as the policy prototype and graph tools AGG [9, 10] and GROOVE [8, 11] as the verification and analysis tools.  ... 
doi:10.1016/j.entcs.2004.12.031 fatcat:cjg76ig4cnehtgtgietxenyasi

Formal Proofs of Code Generation and Verification Tools [chapter]

Xavier Leroy
2014 Lecture Notes in Computer Science  
A radical solution to these two risks is the deductive verification of compilers and verification tools themselves.  ...  Tool-assisted verification of critical software has great potential but is limited by two risks: unsoundness of the verification tools, and miscompilation when generating executable code from the sources  ...  A radical solution to these two risks is the deductive verification of compilers and verification tools themselves.  ... 
doi:10.1007/978-3-319-10431-7_1 fatcat:qbj2jm72gfdy5crez3seavzys4

Security protocols verification combining existing approaches and tools

Kotenko, Reznik, Shorov
2014 Труды СПИИРАН  
Security protocols verification combining existing approaches and tools. Abstract.  ...  To solve this problem combined verification approach which is based on the assembly of strong sides specific for different existing approaches and tools is suggested.  ... 
doi:10.15622/sp.8.14 fatcat:aqrli6cbsndyjes32fqfjv2o7a

gNOSIS: A Board-Level Debugging and Verification Tool

Ashfaquzzaman Khan, Richard Neil Pittman, Alessandro Forin
2010 2010 International Conference on Reconfigurable Computing and FPGAs  
In this paper, we introduce gNOSIS, an automated tool for board-level debugging and verification of FPGA designs. gNOSIS uses the Capture/Readback features of the FPGA to checkpoint the entire state of  ...  by currently available tools (e.g.  ...  Here we introduce gNOSIS, an automated board-level debugging/verification tool that allows the designers to see the entire state of the circuit and provides precise information about the timing and location  ... 
doi:10.1109/reconfig.2010.71 dblp:conf/reconfig/KhanPF10 fatcat:7fea3omk4rdjxjxtuwregqj6ce

Analysis and Transformation Tools for Constrained Horn Clause Verification [article]

John P. Gallagher, Bishoksan Kafle
2014 arXiv   pre-print
Current CHC verification tools implement intricate algorithms and are often limited to certain subclasses of CHC problems.  ...  Several techniques and tools have been developed for verification of properties expressed as Horn clauses with constraints over a background theory (CHC).  ...  Recently there is a growing interest in CHC verification from both the logic programming and software verification communities, and several verification techniques and tools have been developed for CHC  ... 
arXiv:1405.3883v1 fatcat:i3zfwewz7nfr3pvd7hqw7t2gce

Tools and Methods for RTCP-Nets Modeling and Verification

Marcin Szpyrka, Jerzy Biernacki, Agnieszka Biernacka
2016 Archives of Control Sciences  
The paper deals with practical aspects of using RTCP-nets for modeling and verification of real-time systems. It contains a survey of software tools developed to support RTCP-nets.  ...  Two approaches to verification of RTCP-nets are considered in the paper.  ...  The first one (Table 10 ) covers verification in nuXmv and the other (Table 11 ) verification in CADP Evaluator tool.  ... 
doi:10.1515/acsc-2016-0019 fatcat:oxhdrqx7urh6vlwe642oltembe
« Previous Showing results 1 — 15 out of 549,694 results