期刊文献+
共找到760篇文章
< 1 2 38 >
每页显示 20 50 100
Formal Verification of the Merchant Registration Phase of the SET Protocol 被引量:1
1
作者 Xiao-Qi Ma Xiao-Chun Cheng 《International Journal of Automation and computing》 EI 2005年第2期155-162,共8页
This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the s... This paper describes the formal verification of the Merchant Registration phase of the Secure Electronic Transactions (SET) protocol, a realistic electronic transaction security protocol which is used to protect the secrecy of online purchases. A number of concepts, notations, functions, predicates, assumptions and rules are introduced. We describe the knowledge of all legal participants, and a malicious spy, to assess the security of the sub-protocol. Avoiding search in a large state space, the method converges very quickly. We implemented our method in the Isabelle/Isar automated reasoning environment, therefore the whole verification process can be executed mechanically and efficiently. Keywords Formal verification - electronic transaction protocol - knowledge-based system This work was supported by EC, EPSRC, the National Natural Science Foundation of China (No.60496320, 60496321), and Hong Kong K C Wang Education Foundation.Xiao-Qi Ma graduated from Nanjing University of Science and Technology, China, in 1997. He received his Master’s degree from the Institute of Software, Chinese Academy of Sciences in 2003. He is currently a PhD student at the University of Reading. His research interests include computer network security, knowledge-based systems, and operating systems.Xiao-Chun Cheng obtained his PhD in 1996. He has worked as a lecturer at the University of Reading since 2000. He is a vip professor at North East Normal University and Beijing Normal University. His research interests include theoretical and applied aspects in decision support systems, knowledge-based systems and intelligent systems. 展开更多
关键词 formal verification electronic transaction protocol knowledge-based system
在线阅读 下载PDF
Formal Verification of TASM Models by Translating into UPPAAL 被引量:1
2
作者 胡凯 张腾 +3 位作者 杨志斌 顾斌 蒋树 姜泮昌 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期51-54,共4页
Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activitie... Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activities by translating into UPPAAL. Firstly, the translational semantics from TASM to UPPAAL is presented through atlas transformation language(ATL). Secondly, the implementation of the proposed model transformation tool TASM2UPPAAL is provided. Finally, a case study is given to illustrate the automatic transformation from TASM model to UPPAAL model. 展开更多
关键词 timed abstract state machine(TASM) formal verification model transformation atlas transformation language(ATL) UPPAAL
在线阅读 下载PDF
Formal Verification under Unknown Constraints 被引量:1
3
作者 LI Guang-hui LI Xiao-wei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期43-46,共4页
We present a formal method of verifying designs with unknown constraints(e.g.,black boxes)using Boolean satisfiability(SAT).This method is based on a new encoding scheme of unknown constraints,and solves the correspon... We present a formal method of verifying designs with unknown constraints(e.g.,black boxes)using Boolean satisfiability(SAT).This method is based on a new encoding scheme of unknown constraints,and solves the corresponding conjunctive normal form(CNF)formulas.Furthermore,this method can avoid the potential memory explosion,which the binary decision diagram(BDD)based techniques maybe suffer from,thus it has the capacity of verifying large designs.Experimental results demonstrate the efficiency and feasibility of the proposed method. 展开更多
关键词 formal verification unknown constraints black box Boolean satisfiability Boolean comparison
在线阅读 下载PDF
Formal Verification of Secrecy in Group Key Protocols Using Event-B
4
作者 Amjad Gawanmeh Sofiène Tahar Leila Jemni Ben Ayed 《International Journal of Communications, Network and System Sciences》 2012年第3期165-177,共13页
Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distri... Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study. 展开更多
关键词 GROUP KEY Protocols formal verification FORWARD SECRECY SECRECY EVENT-B
在线阅读 下载PDF
A Formal Method for Service Choreography Verification Based on Description Logic
5
作者 Tingting Zhang Yushi Lan +2 位作者 Minggang Yu Changyou Zheng Kun Liu 《Computers, Materials & Continua》 SCIE EI 2020年第2期893-904,共12页
Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model.This paper presents a new approa... Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model.This paper presents a new approach of choreography model verification based on Description Logic.A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography.Based on the framework,a set of rules and constraints are defined in Description Logic for choreography model verification.To automate model verification,the UML-based service choreography model will be transformed,by the given algorithms,into the DL-based ontology,and thus the model properties can be verified by reasoning through the ontology with the help of a popular DL reasoned.A case study is given to demonstrate applicability of the method.Furthermore,the work will be compared with other related research. 展开更多
关键词 Service choreography WS-CDL meta-concept model description logic formal verification
在线阅读 下载PDF
Formal Verification Platform as a Service:WebAssembly Vulnerability Detection Application
6
作者 LiangJun Deng Hang Lei +6 位作者 Zheng Yang WeiZhong Qian XiaoYu Li Hao Wu Sihao Deng RuChao Sha WeiDong Deng 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2155-2170,共16页
In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work build... In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service(FVPS),which aims to provide an automated report of vulnerability detections,this work builds a Hyperledger Fabric blockchain runtime model.It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages.This methodology utilizes an external application programming interface(API)table to replace the source codes in compilation,thereby pruning the part of housekeeping codes to ease code inflation.Code inflation is a significant metric in formal language translation.Namely,minor code inflation enhances verification scale and performance efficiency.It determines the efficiency of formal verification,involving launching,running,and memory usage.For instance,path explosion increases exponentially,resulting in out-of-memory.The experimental results conclude that program languages like golang severely impact code inflation.FVPS reduces the wasm code size by over 90%,achieving two orders of optimization magnitude,from 2000 kilobyte(KB)to 90 KB.That means we can cope with golang applications up to 20 times larger than the original in scale.This work eliminates the gap between Hyperledger Fabric smart contracts and WebAssembly.Our approach is pragmatic,adaptable,extendable,and flexible.Nowadays,FVPS is successfully applied in a Railway-Port-Aviation blockchain transportation system. 展开更多
关键词 WebAssembly formal verification blockchain smart contract
在线阅读 下载PDF
Formal Verification of Robertson-Type Uncertainty Relation
7
作者 Takaaki Masuhara Toru Kuriyama +1 位作者 Masakazu Yoshida Jun Cheng 《Journal of Quantum Information Science》 2015年第2期58-70,共13页
Formal verification using interactive theorem provers have been noticed as a method of verification of proofs that are too big for humans to check the validity of them. The purpose of this work is to verify the validi... Formal verification using interactive theorem provers have been noticed as a method of verification of proofs that are too big for humans to check the validity of them. The purpose of this work is to verify the validity of Robertson-type uncertainty relation toward verifying unconditional security of quantum key distributions. We verify the validity of the relation by using proof assistant Coq and it is turned out that the theorem regarding the relation formally holds. The source code for Coq which represents the validity of the theorem is printed in Appendix. 展开更多
关键词 formal verification PROOF ASSISTANT COQ UNCERTAINTY RELATION
在线阅读 下载PDF
Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network 被引量:3
8
作者 XI Ning SUN Cong +2 位作者 MA Jianfeng CHEN Xiaofeng SHEN Yulong 《China Communications》 SCIE CSCD 2016年第4期119-130,共12页
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. 展开更多
关键词 information flow security service composition formal verification smart sensor network
在线阅读 下载PDF
A Comparative Analysis of Tools for Verification of Security Protocols 被引量:2
9
作者 Nitish Dalal Jenny Shah +1 位作者 Khushboo Hisaria Devesh Jinwala 《International Journal of Communications, Network and System Sciences》 2010年第10期779-787,共9页
The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have inde... The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify the security properties of a cryptographic protocol. This has resulted in the emergence of the security protocol verifiers to fill the need. In this paper, taking the two popular security verification tools namely Scyther and ProVerif as the basis, we identify a few security protocols and implement them in both Scyther and ProVerif, to aptly evaluate the tools, in terms of the security properties of the selected protocols. In the process, we not only characteristically present a comparative evaluation of the two tools, but also reveal interesting security properties of the protocols selected, showing their strengths and weaknesses. To the best of our knowledge, this is a unique attempt to juxtapose and evaluate the two verification tools using the selected security protocols. 展开更多
关键词 formal verification SECURITY Protocols ATTACKS
暂未订购
Semantic Consistency and Correctness Verification of Digital Traffic Rules 被引量:1
10
作者 Lei Wan Changjun Wang +3 位作者 Daxin Luo Hang Liu Sha Ma Weichao Hu 《Engineering》 SCIE EI CAS CSCD 2024年第2期47-62,共16页
The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules... The consensus of the automotive industry and traffic management authorities is that autonomous vehicles must follow the same traffic laws as human drivers.Using formal or digital methods,natural language traffic rules can be translated into machine language and used by autonomous vehicles.In this paper,a translation flow is designed.Beyond the translation,a deeper examination is required,because the semantics of natural languages are rich and complex,and frequently contain hidden assumptions.The issue of how to ensure that digital rules are accurate and consistent with the original intent of the traffic rules they represent is both significant and unresolved.In response,we propose a method of formal verification that combines equivalence verification with model checking.Reasonable and reassuring digital traffic rules can be obtained by utilizing the proposed traffic rule digitization flow and verification method.In addition,we offer a number of simulation applications that employ digital traffic rules to assess vehicle violations.The experimental findings indicate that our digital rules utilizing metric temporal logic(MTL)can be easily incorporated into simulation platforms and autonomous driving systems(ADS). 展开更多
关键词 Autonomous driving Traffic rules DIGITIZATION formalIZATION verification
在线阅读 下载PDF
Refinement modeling and verification of secure operating systems for communication in digital twins
11
作者 Zhenjiang Qian Gaofei Sun +1 位作者 Xiaoshuang Xing Gaurav Dhiman 《Digital Communications and Networks》 SCIE CSCD 2024年第2期304-314,共11页
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely correct.Formal verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented correctly.In this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly instructions.The verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations. 展开更多
关键词 Theorem proving Isabelle/HOL formal verification System modeling Correctness verification
在线阅读 下载PDF
SUMMARIZATION OF BOOLEAN SATISFIABILITY VERIFICATION
12
作者 Qian Junyan Wu Juan +1 位作者 Zhao Lingzhong Guo Yunchuan 《Journal of Electronics(China)》 2014年第3期232-245,共14页
As a complementary technology to Binary Decision Diagram-based(BDD-based) symbolic model checking, the verification techniques on Boolean satisfiability problem have gained an increasing wide of applications over the ... As a complementary technology to Binary Decision Diagram-based(BDD-based) symbolic model checking, the verification techniques on Boolean satisfiability problem have gained an increasing wide of applications over the last few decades, which brings a dramatic improvement for automatic verification. In this paper, we firstly introduce the theory about the Boolean satisfiability verification, including the description on the problem of Boolean satisfiability verification, Davis-Putnam-Logemann-Loveland(DPLL) based complete verification algorithm, and all kinds of solvers generated and the logic languages used by those solvers. Moreover, we formulate a large number optimizations of technique revolutions based on Boolean SATisfiability(SAT) and Satisfiability Modulo Theories(SMT) solving in detail, including incomplete methods such as bounded model checking, and other methods for concurrent programs model checking. Finally, we point out the major challenge pervasively in industrial practice and prospect directions for future research in the field of formal verification. 展开更多
关键词 Boolean SATisfiability(SAT) Satisfiability Modulo Theories(SMT) Model checking formal verification
在线阅读 下载PDF
Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets
13
作者 Maryam Jamal Nazir Ahmad Zafar +3 位作者 Atta-ur-Rahman Dhiaa Musleh Mohammed A.Gollapalli Sghaier Chabani 《Computers, Materials & Continua》 SCIE EI 2022年第8期3331-3348,共18页
The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,... The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,with the growing malicious threats a secure communication between aircraft and controllers becomes highly important.This research serves as a starting point for integration of BB84 quantum protocol with petri nets for secure modeling and verification of takeoff procedure.The integrated model combines the BB84 quantum cryptographic protocol with powerful verification tool support offered by petri nets.To model certain important properties of BB84,a new variant of petri nets coined as Quantum Nets are proposed by defining their mathematical foundations and overall system dynamics,furthermore,some important system properties are also abstractly defined.The proposed QuantumNets are then applied for modeling of aircraft takeoff process by defining three quantum nets:namely aircraft,runway controller and gate controller.For authentication between quantum nets,the use of external places and transitions is demonstrated to describe the encryptiondecryption process of qubits stream.Finally,the developed takeoff quantum network is verified through simulation offered by colored petri-net(CPN)Tools.Moreover,reachability tree(RT)analysis is also performed to have greater confidence in feasibility and correctness of the proposed aircraft takeoff model through the Quantum Nets. 展开更多
关键词 Aircraft takeoff BB84 quantum cryptography PETRI-NETS quantum nets formal modeling and verification
在线阅读 下载PDF
Semantic Knowledge Based Reinforcement Learning Formalism for Smart Learning Environments
14
作者 Taimoor Hassan Ibrar Hussain +3 位作者 Hafiz Mahfooz Ul Haque Hamid Turab Mirza Muhammad Nadeem Ali Byung-Seo Kim 《Computers, Materials & Continua》 2025年第10期2071-2094,共24页
Smart learning environments have been considered as vital sources and essential needs in modern digital education systems.With the rapid proliferation of smart and assistive technologies,smart learning processes have ... Smart learning environments have been considered as vital sources and essential needs in modern digital education systems.With the rapid proliferation of smart and assistive technologies,smart learning processes have become quite convenient,comfortable,and financially affordable.This shift has led to the emergence of pervasive computing environments,where user’s intelligent behavior is supported by smart gadgets;however,it is becoming more challenging due to inconsistent behavior of Artificial intelligence(AI)assistive technologies in terms of networking issues,slow user responses to technologies and limited computational resources.This paper presents a context-aware predictive reasoning based formalism for smart learning environments that facilitates students in managing their academic as well as extra-curricular activities autonomously with limited human intervention.This system consists of a three-tier architecture including the acquisition of the contextualized information from the environment autonomously,modeling the system using Web Ontology Rule Language(OWL 2 RL)and Semantic Web Rule Language(SWRL),and perform reasoning to infer the desired goals whenever and wherever needed.For contextual reasoning,we develop a non-monotonic reasoning based formalism to reason with contextual information using rule-based reasoning.The focus is on distributed problem solving,where context-aware agents exchange information using rule-based reasoning and specify constraints to accomplish desired goals.To formally model-check and simulate the system behavior,we model the case study of a smart learning environment in the UPPAAL model checker and verify the desired properties in the model,such as safety,liveness and robust properties to reflect the overall correctness behavior of the system with achieving the minimum analysis time of 0.002 s and 34,712 KB memory utilization. 展开更多
关键词 CONTEXT-AWARENESS reinforcement learning multi-agent systems non-monotonic reasoning formal verification
在线阅读 下载PDF
RISC-V SBI固件安全启动过程的形式化验证
15
作者 杨叶倩 戴鸿君 《计算机研究与发展》 北大核心 2026年第3期768-781,共14页
RISC-V SBI(supervisor binary interface)标准定义了RISC-V架构硬件与操作系统的接口规范。相比x86和ARM固件,SBI固件更合规、可靠;但现有版本仍存在启动正确性未验证、PMP(physical memory protection)物理地址访问等安全漏洞。为此,... RISC-V SBI(supervisor binary interface)标准定义了RISC-V架构硬件与操作系统的接口规范。相比x86和ARM固件,SBI固件更合规、可靠;但现有版本仍存在启动正确性未验证、PMP(physical memory protection)物理地址访问等安全漏洞。为此,提出了定理证明驱动的闭环形式化验证框架,开发经形式验证的SBI固件——SeSBI,并结合Dafny与Isabelle/HOL,以分层策略实现对启动过程的形式验证。为提高验证效率,提出RISC-V硬件模拟策略,统一建模固件与硬件的交互,从而显著降低验证开销。最终成功验证了SeSBI固件启动过程的功能正确性。结果表明,SeSBI以更简洁的代码实现SBI标准启动过程接口,并具备高度可靠性,为RISC-V生态系统提供了经形式验证的可信SBI固件实现。未来工作将扩展验证范围至更多高级属性,并优化验证工具以提升效率。 展开更多
关键词 RISC-V SBI固件 形式化验证 定理证明 功能正确性
在线阅读 下载PDF
基于定理证明的UML多视图模型良构一致性验证方法
16
作者 吴润方 杜晔 黎妹红 《计算机应用研究》 北大核心 2026年第2期577-587,共11页
针对复杂系统中UML多视图模型良构一致性验证的难题,提出了一种融合结构映射与定理证明的双层验证框架,以系统性地解决跨视图语义交织与结构耦合引发的建模质量风险。该方法通过结构映射验证算法(SMIVA)自动抽取3种视图模型间的结构匹... 针对复杂系统中UML多视图模型良构一致性验证的难题,提出了一种融合结构映射与定理证明的双层验证框架,以系统性地解决跨视图语义交织与结构耦合引发的建模质量风险。该方法通过结构映射验证算法(SMIVA)自动抽取3种视图模型间的结构匹配关系,生成良构一致性断言集以保障类型、命名与拓扑闭合性;同时,基于交互式定理证明器Coq构建形式化断言体系,将行为语义与状态迁移转换为可判定命题,实现语义一致性的逻辑推导。实验以电子商务系统为例,完成了13条良构一致性约束定理的形式化证明。结果表明,该方法能有效提升断言提取的覆盖性、自动化验证能力和验证效率,对提升UML建模质量具有重要意义。 展开更多
关键词 UML模型 多视图一致性 结构映射 定理证明 形式化验证
在线阅读 下载PDF
大模型驱动的形式化定理证明:综述与展望
17
作者 胡俊杰 陈宇杰 +7 位作者 胡义坤 文成 曹嘉伦 马智 苏杰 孙纬地 田聪 秦胜潮 《计算机科学》 北大核心 2026年第4期1-23,共23页
定理证明作为逻辑与计算机科学的交汇点,不仅奠定了现代数学推理的形式化基础,也是衡量人工智能逻辑推理能力的试金石,更支撑着软件工程对高可靠性的根本需求。然而,传统定理证明依赖严谨的逻辑推理与繁琐的人机交互,长期面临自动化程... 定理证明作为逻辑与计算机科学的交汇点,不仅奠定了现代数学推理的形式化基础,也是衡量人工智能逻辑推理能力的试金石,更支撑着软件工程对高可靠性的根本需求。然而,传统定理证明依赖严谨的逻辑推理与繁琐的人机交互,长期面临自动化程度有限、推理效率不足以及对专家经验高度依赖等难题。随着大语言模型(LLM)的快速发展,其在自然语言理解、代码生成和逻辑推理等方面展现出突破性能力,为提升自动定理证明的自动化与智能化水平提供了新的契机。为此,系统梳理了大模型驱动的形式化定理证明的研究现状与趋势,重点聚焦于两个主要应用场景。1)在交互式定理证明方面,分析了现有工作是如何缓解其手动开销巨大的难题,并以Lean语言中的Prover系列工作为例,系统总结了其技术演化路径。2)在自动定理证明方面,探讨了大模型如何结合静态分析、验证器反馈等技术,自动生成函数合约、循环不变式等形式化规约,从而显著降低验证门槛。最后,归纳了该领域中面临的共性挑战,包括规约完备性、推理可靠性、数据稀缺性以及工具链集成等,并展望了未来的发展方向。 展开更多
关键词 定理证明 形式化方法 大语言模型 形式化验证 形式化规约
在线阅读 下载PDF
基于CompCert内存模型的智能合约中间语言的可信编译
18
作者 许颖 张亚丰 +5 位作者 许晶航 康跃馨 夏清 袁峰 左春 李玉成 《信息安全学报》 2026年第1期22-36,共15页
智能合约是区块链技术的重要组成部分之一,具有不可篡改、自动执行等特点,为去中心化应用提供了丰富的编程基础。近年来相关安全漏洞事件频发,使得智能合约的安全性研究逐渐成为热点。其中,智能合约编译器的误编译问题会令源代码编译产... 智能合约是区块链技术的重要组成部分之一,具有不可篡改、自动执行等特点,为去中心化应用提供了丰富的编程基础。近年来相关安全漏洞事件频发,使得智能合约的安全性研究逐渐成为热点。其中,智能合约编译器的误编译问题会令源代码编译产生不符合开发者原本预期的目标代码,导致部署在区块链上的代码存在安全隐患,然而现有工作较少考虑到这一问题。因此,首先从避免合约安全漏洞的原则出发,设计一种非图灵完备的智能合约领域专用语言isCL。作为可信编译的源语言,它支持复合数据类型与内置函数,以便于开发人员编写合约;然后设计可信编译器i2c的整体架构,实现以C语言子集Clight语言为目标语言的完整翻译过程;再针对基于CompCert内存模型的智能合约中间语言的翻译阶段,定义消除复合类型、出参入参合并、生成Clight三个翻译阶段的相关语法、语义,并给出语义保持性的证明思路;最后通过服装供应链分账应用实例和Solidity、Rust的编译漏洞案例来分别说明isCL语言的实用性与智能合约可信编译的有效性。本文工作为智能合约的可信编译提供了研究思路,有利于促进智能合约开发的安全性研究,为实现更加安全可信的区块链应用提供有力支撑。 展开更多
关键词 区块链 智能合约语言 领域专用语言 形式化验证 经过验证的编译器
在线阅读 下载PDF
面向资源共享的可实现低熵率生物特征双因子身份认证方案研究
19
作者 李硕 张敏 +1 位作者 李忠瑞 陈泉 《西南民族大学学报(自然科学版)》 2026年第1期90-100,共11页
随着资源共享的需求性不断增高,传统的单因子或对生物特征熵率要求高的双因子身份认证方案在安全性与适用性方面面临极大挑战.提出一种适用于资源共享场景的生物特征低熵率双因子身份认证方案,降低了对生物特征熵率的依赖,有效提升了认... 随着资源共享的需求性不断增高,传统的单因子或对生物特征熵率要求高的双因子身份认证方案在安全性与适用性方面面临极大挑战.提出一种适用于资源共享场景的生物特征低熵率双因子身份认证方案,降低了对生物特征熵率的依赖,有效提升了认证安全性与系统可用性.通过BAN逻辑与ProVerif工具的验证,该方案在会话密钥保密性、防重放攻击等方面均具有较强保障.同时,基于Ganache环境的仿真实验表明本方案具有较低的计算与通信开销,具备良好的实用性. 展开更多
关键词 资源共享 双因子身份认证 低熵率 区块链 Proverif形式化验证
在线阅读 下载PDF
操作系统形式规约与验证综述
20
作者 王梓 王洪强 +1 位作者 杨晓艺 兰雨晴 《计算机工程》 北大核心 2026年第2期24-45,共22页
操作系统(OS)作为信息时代关键基础设施,广泛应用于军事、工业、医疗等核心领域。其可靠性与安全性直接决定关键领域运行稳定,漏洞易致系统崩溃、数据泄露等严重后果,因此构建系统化安全保障体系具有重要理论与工程价值。以“形式规约-... 操作系统(OS)作为信息时代关键基础设施,广泛应用于军事、工业、医疗等核心领域。其可靠性与安全性直接决定关键领域运行稳定,漏洞易致系统崩溃、数据泄露等严重后果,因此构建系统化安全保障体系具有重要理论与工程价值。以“形式规约-形式验证-工程落地”为框架,梳理近十年该领域研究成果,剖析技术路径与实践应用。在形式规约层面,明确基于迁移系统等数学结构描述系统功能的模型规约与基于线性时序逻辑(LTL)定义安全、活性需求的性质规约的差异,从功能正确性和安全属性两个方面进行阐述,其中,功能正确性涵盖任务管理调度、内存分配回收、异常中断处理、任务间通信与文件系统读写一致性,安全属性聚焦访问控制的BLP模型与BIBA模型、分离内核多域隔离、信息流无干扰与无泄漏理论。在形式验证层面,阐述依托霍尔逻辑验证程序一致性的推理证明、基于LTL与计算树逻辑(CTL)验证时序属性的模型检测、属性验证标准化流程3类核心方法,并以首个通过机器证明实现功能正确与信息流无干扰的seL4微内核为案例,揭示理论到工程的转化路径。在工程应用上,总结汽车领域控制器局域网(CAN)总线通信验证、智能手机Android系统组件间通信鲁棒性检测的成果。本文的系统性梳理旨在为相关领域的研究奠定基础,为大语言模型提供数据集支持,并为最终的技术工程落地提供参考。 展开更多
关键词 操作系统 形式化方法 形式规约 形式验证 系统安全
在线阅读 下载PDF
上一页 1 2 38 下一页 到第
使用帮助 返回顶部