Applying formal verification to the AAMP5 microprocessor: A case study in the industrial use of formal methods

1996 ◽  
Vol 8 (2) ◽  
pp. 153-188 ◽  
Author(s):  
Mandayam K. Srivas ◽  
Steven P. Miller
2014 ◽  
pp. 63-68
Author(s):  
Marius Minea ◽  
Cornel Izbasa ◽  
Calin Jebelean

This paper presents a case study in the application of formal methods to the verification of communication protocols. We analyze one component block of telephone switching software developed in the SDL language at Alcatel Network Systems Romania. We use the IF toolset from VERIMAG Grenoble to build a state-transition model of the system and verify selected properties. We present the steps performed for translation and verification and discuss the potential for automating the process and using it on a larger scale.


2016 ◽  
Vol 324 ◽  
pp. 31-50 ◽  
Author(s):  
Jonas Santos Bezerra ◽  
Andrei Costa ◽  
Leila Ribeiro ◽  
Érika Cota

2016 ◽  
Vol 65 (3) ◽  
pp. 1163-1179 ◽  
Author(s):  
Rovedy Aparecida Busquim e Silva ◽  
Nanci Naomi Arai ◽  
Luciana Akemi Burgareli ◽  
Jose Maria Parente de Oliveira ◽  
Jorge Sousa Pinto
Keyword(s):  

2015 ◽  
Vol 14 (4) ◽  
pp. 5621-5631
Author(s):  
AJAYI ADEBOWALE ◽  
NICULAE GOGA ◽  
OTUSILE OLUWABUKOLA ◽  
ABEL SAMUEL

Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.


2018 ◽  
Vol 272 ◽  
pp. 52-64 ◽  
Author(s):  
Antonios Gouglidis ◽  
Christos Grompanopoulos ◽  
Anastasia Mavridou

Author(s):  
Mario Ciampi ◽  
Antonio Coronato ◽  
Giuseppe De Pietro ◽  
Luigi Gallo

Virtual Environments are complex systems in that they involve the crucial concept of sharing. Users can share knowledge of each other’s current activities, environments, and actions. In this chapter, the authors discuss about interaction interoperability, intended to mean the ability of two or more users to cooperate despite the heterogeneity of their interfaces. To allow such interoperability, formal methods to formalize the knowledge and middleware solutions for sharing that knowledge are required. After introducing the state-of-the-art solutions and the open issues in the field, the authors describe a system for providing interaction interoperability among multi-user interfaces. Rather than focusing on the de-coupling of input devices from interaction techniques and from interaction tasks, this chapter suggests integrating interactive systems at higher level through an interface standardization. To achieve this aim, the authors propose: i) an architectural model able to handle differences in input devices and interaction tasks; ii) an agent-based middleware that provides basic components to integrate heterogeneous user interfaces. The chapter also presents a case study in which an agent-based middleware is used to support developers in the interconnection of monolithic applications.


Sign in / Sign up

Export Citation Format

Share Document