the proceedings contain 18 papers. the topics discussed include: verifying monadic second-order properties of graph programs;generating abstract graph-based procedure summaries for pointer programs;generating inductiv...
ISBN:
(纸本)9783319091075
the proceedings contain 18 papers. the topics discussed include: verifying monadic second-order properties of graph programs;generating abstract graph-based procedure summaries for pointer programs;generating inductive predicates for symbolic execution of pointer-manipulating programs;attribute handling for generating preconditions from graph constraints;from core OCL invariants to nested graph constraints;specification and verification of graph-based model transformation properties;a static analysis of non-confluent triple graph grammars for efficient model transformation;transformation and refinement of rigid structures;reversible sesqui-pushout rewriting;on pushouts of partial maps;the subgraph isomorphism problem on a class of hyperedge replacement languages;canonical derivations with negative application conditions;and van kampen squares for graph transformation.
Copying, or cloning, is a basic operation used in the specification of many applications in computer science. However, when dealing with complex structures, like graphs, cloning is not a straightforward operation sinc...
详细信息
ISBN:
(纸本)9783642548048;9783642548031
Copying, or cloning, is a basic operation used in the specification of many applications in computer science. However, when dealing with complex structures, like graphs, cloning is not a straightforward operation since a copy of a single vertex may involve (implicitly) copying many edges. therefore, most graph transformation approaches forbid the possibility of cloning. We tackle this problem by providing a framework for graph transformations with cloning. We use attributed graphs and allow rules to change attributes. these two features (cloning/changing attributes) together give rise to a powerful formal specification approach. In order to handle different kinds of graphs and attributes, we first define the notion of attributed structures in an abstract way. then we generalise the sesqui-pushout approach of graph transformation in the proposed general framework and give appropriate conditions under which attributed structures can be transformed. Finally, we instantiate our general framework with different examples, showing that many structures can be handled and that the proposed framework allows one to specify complex operations in a natural way.
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabili...
详细信息
ISBN:
(纸本)9783642548048;9783642548031
Security has become the Achilles' heel of most modern software systems. Techniques ranging from the manual inspection to automated static and dynamic analyses are commonly employed to identify security vulnerabilities prior to the release of the software. However, these techniques are time consuming and cannot keep up withthe complexity of ever-growing software repositories (e.g., Google Play and Apple App Store). In this paper, we aim to improve the status quo and increase the efficiency of static analysis by mining relevant information from vulnerabilities found in the categorized software repositories. the approach relies on the fact that many modern software systems are developed using rich application development frameworks (ADF), allowing us to raise the level of abstraction for detecting vulnerabilities and thereby making it possible to classify the types of vulnerabilities that are encountered in a given category of application. We used open-source software repositories comprising more than 7 million lines of code to demonstrate how our approach can improve the efficiency of static analysis, and in turn, vulnerability detection.
While most debugging techniques focus on patching implementations, there are bugs whose most appropriate corrections consist in fixing the specification to prevent invalid executions-such as to define the correct inpu...
详细信息
ISBN:
(纸本)9783642548048;9783642548031
While most debugging techniques focus on patching implementations, there are bugs whose most appropriate corrections consist in fixing the specification to prevent invalid executions-such as to define the correct input domain of a function. In this paper, we present a fully automatic technique that fixes bugs by proposing changes to contracts (simple executable specification elements such as pre- and postconditions). the technique relies on dynamic analysis to understand the source of buggy behavior, to infer changes to the contracts that emend the bugs, and to validate the changes against general usage. We have implemented the technique in a tool called SpeciFix, which works on programs written in Eiffel, and evaluated it on 44 bugs found in standard data-structure libraries. Manual analysis by human programmers found that SpeciFix suggested repairs that are deployable for 25% of the faults;in most cases, these contract repairs were preferred over fixes for the same bugs that change the implementation.
Model finders are becoming useful in many software engineering problems. Kodkod [19] is one of the most popular, due to its support for relational logic (a combination of first order logic with relational algebra oper...
详细信息
ISBN:
(纸本)9783642548048;9783642548031
Model finders are becoming useful in many software engineering problems. Kodkod [19] is one of the most popular, due to its support for relational logic (a combination of first order logic with relational algebra operators and transitive closure), allowing a simpler specification of constraints, and support for partial instances, allowing the specification of a priori (exact, but potentially partial) knowledge about a problem's solution. However, in some software engineering problems, such as model repair or bidirectional model transformation, knowledge about the solution is not exact, but instead there is a known target that the solution should approximate. In this paper we extend Kodkod's partial instances to allow the specification of such targets, and show how its model finding procedure can be adapted to support them (using both PMax-SAT solvers or SAT solvers with cardinality constraints). Two case studies are also presented, including a careful performance evaluation to assess the effectiveness of the proposed extension.
We present a formal verification approach for detecting design issues related to user interaction, with a focus on user interface of medical devices. the approach makes a novel use of configuration diagrams proposed b...
详细信息
ISBN:
(纸本)9783642548048;9783642548031
We present a formal verification approach for detecting design issues related to user interaction, with a focus on user interface of medical devices. the approach makes a novel use of configuration diagrams proposed by Rushby to formally verify important human factors properties of user interface implementation. In particular, it first translates the software implementation of user interface into an equivalent formal specification, from which a behavioral model is constructed using theorem proving;human factors properties are then verified against the behavioral model;lastly, a comprehensive set of test inputs are produced by exploring the behavioral model, which can be used to challenge the real interface implementation and to ensure that the issues detected in the behavior model do apply to the implementation. We have prototyped the approach based on the PVS proof system, and applied it to analyze the user interface of a real medical device. the analysis detected several interaction design issues in the device, which may potentially lead to severe consequences.
the recent interest in reversible computation led to plenty of ( automatic) approaches for the design of the corresponding circuits. While this automation is desired in order to provide a proper support for the design...
详细信息
ISBN:
(纸本)9783319084947;9783319084930
the recent interest in reversible computation led to plenty of ( automatic) approaches for the design of the corresponding circuits. While this automation is desired in order to provide a proper support for the design of complex functionality, often a manual consideration and human intuition enable improvements or provide new ideas for design solutions. However, this manual interaction requires a good understanding of the structure or the properties of a reversible cascade which, with increasing circuit size, becomes harder to grasp. Visualization techniques that abstract irrelevant details and focus on intuitively displaying important structures or properties provide a solution to this problem and have already successfully been applied in other domains such as design of conventional software, hardware debugging, or Boolean satisfiability. In this work, we introduce RevVis, a graphical interface which visualizes structures and properties of reversible circuits. RevVis collects relevant data of a given reversible cascade and presents it in a simple but intuitive fashion. By this, RevVis unveils information on characteristic structures and properties of reversible circuits that could be utilized for further optimization. A case study demonstrates this by considering circuits obtained from several synthesis approaches.
the proceedings contain 64 papers. the special focus in this conference is on Intelligent Systems and Knowledge Engineering. the topics include: Function set-valued information systems;neutrality in bipolar structures...
the proceedings contain 64 papers. the special focus in this conference is on Intelligent Systems and Knowledge Engineering. the topics include: Function set-valued information systems;neutrality in bipolar structures;multirate multisensor data fusion algorithm for state estimation with cross-correlated noises;accurate computation of fingerprint intrinsic images with PDE-based regularization;research on mental coefficient of a multi-agent negotiation model;a signed trust-based recommender approach for personalized government-to-business e-services;aspects of coordinating the bidding strategy in concurrent one-to-many negotiation;relevance in preference structures;segregation and the evolution of cooperation;a model of selecting expert in sensory evaluation;software development method based on structured management of code;a collaborative filtering recommender approach by investigating interactions of interest and trust;probabilistic composite rough set and attribute reduction;AM-FM signal modulation recognition based on the power spectrum;model-based approach for reporting system development;a time dependent model via non-local operator for image restoration;a node importance based label propagation approach for community detection;an object-oriented and aspect-oriented task management toolkit on mobile device;the heuristic methods of dynamic facility layout problem;attitude-based consensus model for heterogeneous group decision making;an application of soft computing techniques to track moving objects in video sequences;key technologies and prospects of individual combat exoskeleton;a femtocell self-configuration deployment scheme in hierarchical networks;reliability and quality in the area of statistical thinking in engineering;a novel fast approach to eye location and face geometric correction;multivariate time series prediction based on multi-output support vector regression;a first approach of a new learning strategy;expert system of ischemia classification bas
In bounded program verification a finite set of execution traces is exhaustively checked in order to find violations to a given specification (i.e. errors). SAT-based bounded verifiers rely on SAT-Solvers as their bac...
详细信息
We study a new form of attractor in parity games and use it to define solvers that run in PTIME and are partial in that they do not solve all games completely. Technically, for color c this new attractor determines wh...
详细信息
ISBN:
(纸本)9783642370755;9783642370748
We study a new form of attractor in parity games and use it to define solvers that run in PTIME and are partial in that they do not solve all games completely. Technically, for color c this new attractor determines whether player c%2 can reach a set of nodes X of color c whilst avoiding any nodes of color less than c. Such an attractor is fatal if player c%2 can attract all nodes in X back to X in this manner. Our partial solvers detect fixed-points of nodes based on fatal attractors and correctly classify such nodes as won by player c%2. Experimental results show that our partial solvers completely solve benchmarks that were constructed to challenge existing full solvers. Our partial solvers also have encouraging run times in practice. For one partial solver we prove that its runtime is in O(vertical bar V vertical bar(3)), that its output game is independent of the order in which attractors are computed, and that it solves all Buchi games.([1])
暂无评论